Description
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.
Remediation
References
https://blog.moku.fr/cves/CVE-2023-43256/
https://blog.moku.fr/cves/CVE-unassigned/
https://github.com/GladysAssistant/Gladys/commit/f27d0ea4689c3deca5739b5f9ed45a2ddbf00b7b
Related Vulnerabilities
CVE-2015-5253 Vulnerability in maven package org.apache.cxf:cxf-rt-rs-security-sso-saml
CVE-2014-7810 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-jasper
CVE-2016-4567 Vulnerability in maven package org.webjars.bower:mediaelement
CVE-2020-5258 Vulnerability in npm package dojo
CVE-2020-28503 Vulnerability in maven package org.webjars.npm:copy-props