Vulnerabilities (CVE)

Filtered by CWE-22
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-6225 1 Sap 2 Netweaver Knowledge Management And Collaboration \(kmc-cm\), Netweaver Knowledge Management And Collaboration \(kmc-wpc\) 2020-04-15 6.5 MEDIUM 8.8 HIGH
SAP NetWeaver (Knowledge Management), versions (KMC-CM - 7.00, 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 and KMC-WPC 7.30, 7.31, 7.40, 7.50), does not sufficiently validate path information provided by users, thus characters representing traverse to parent directory are passed through to the file APIs, allowing the attacker to overwrite, delete, or corrupt arbitrary files on the remote server, leading to Path Traversal.
CVE-2020-8865 1 Horde 1 Groupware 2020-04-15 6.5 MEDIUM 6.3 MEDIUM
This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the params[template] parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10469.
CVE-2019-20085 1 Tvt 2 Nvms-1000, Nvms-1000 Firmware 2020-04-14 5.0 MEDIUM 7.5 HIGH
TVT NVMS-1000 devices allow GET /.. Directory Traversal
CVE-2018-7300 1 Eq-3 2 Homematic Ccu2, Homematic Ccu2 Firmware 2020-04-14 10.0 HIGH 9.8 CRITICAL
Directory Traversal / Arbitrary File Write / Remote Code Execution in the User.setLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to write arbitrary files to the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
CVE-2020-11705 1 Provideserver 1 Provide Ftp Server 2020-04-13 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ProVide (formerly zFTPServer) through 13.1. /ajax/ImportCertificate allows an attacker to load an arbitrary certificate in .pfx format or overwrite arbitrary files via the fileName parameter.
CVE-2015-9546 1 Google 1 Android 2020-04-13 5.8 MEDIUM 4.8 MEDIUM
An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-06-16. In some cases, HTTP is used for an Inputmethod, rather than HTTPS. A man-in-the-middle attacker can modify the client-server data stream to insert directory traversal sequences into an extracted file path. The Samsung ID is SVE-2015-4363 (November 2015).
CVE-2020-10631 1 Advantech 1 Webaccess\/nms 2020-04-10 7.5 HIGH 9.8 CRITICAL
An attacker could use a specially crafted URL to delete or read files outside the WebAccess/NMS's (versions prior to 3.0.2) control.
CVE-2020-10619 1 Advantech 1 Webaccess\/nms 2020-04-10 6.4 MEDIUM 9.1 CRITICAL
An attacker could use a specially crafted URL to delete files outside the WebAccess/NMS's (versions prior to 3.0.2) control.
CVE-2020-6974 1 Honeywell 1 Notifier Webserver 2020-04-09 7.5 HIGH 9.8 CRITICAL
Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which allows an attacker to bypass access to restricted directories. Honeywell has released a firmware update to address the problem.
CVE-2020-10366 1 Logicaldoc 1 Logicaldoc 2020-04-09 5.0 MEDIUM 7.5 HIGH
LogicalDoc before 8.3.3 allows /servlet.gupld Directory Traversal, a different vulnerability than CVE-2020-9423 and CVE-2020-10365.
CVE-2020-11596 1 Cipplanner 1 Cipace 2020-04-07 5.0 MEDIUM 7.5 HIGH
A Directory Traversal issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make HTTP GET requests to a certain URL and obtain information about what files and directories reside on the server.
CVE-2020-11498 1 Slack 1 Nebula 2020-04-06 8.5 HIGH 8.8 HIGH
Slack Nebula through 1.1.0 contains a relative path vulnerability that allows a low-privileged attacker to execute code in the context of the root user via tun_darwin.go or tun_windows.go. A user can also use Nebula to execute arbitrary code in the user's own context, e.g., for user-level persistence or to bypass security controls. NOTE: the vendor states that this "requires a high degree of access and other preconditions that are tough to achieve."
CVE-2020-7008 1 Visam 2 Vbase Editor, Vbase Web-remote 2020-04-06 5.0 MEDIUM 7.5 HIGH
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow input passed in the URL that is not properly verified before use, which may allow an attacker to read arbitrary files from local resources.
CVE-2020-7478 1 Schneider-electric 1 Interactive Graphical Scada System 2020-04-03 5.0 MEDIUM 7.5 HIGH
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory exists in IGSS (Versions 14 and prior using the service: IGSSupdate), which could allow a remote unauthenticated attacker to read arbitrary files from the IGSS server PC on an unrestricted or shared network when the IGSS Update Service is enabled.
CVE-2020-11491 1 Zevenet 1 Zen Load Balancer 2020-04-03 4.0 MEDIUM 4.9 MEDIUM
Monitoring::Logs in Zen Load Balancer 3.10.1 allows remote authenticated admins to conduct absolute path traversal attacks, as demonstrated by a filelog=/etc/shadow request to index.cgi.
CVE-2020-8144 2 Microsoft, Ui 2 Windows, Unifi Video 2020-04-03 5.2 MEDIUM 8.4 HIGH
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware update information. If the version field contains ..\ character sequences, the destination file path to save the firmware can be manipulated to be outside the intended destination directory tree. Fixed in UniFi Video Controller v3.10.3 and newer.
CVE-2020-11414 1 Telerik 1 Ui For Silverlight 2020-04-02 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Progress Telerik UI for Silverlight before 2020.1.330. The RadUploadHandler class in RadUpload for Silverlight expects a web request that provides the file location of the uploading file along with a few other parameters. The uploading file location should be inside the directory where the upload handler class is defined. Before 2020.1.330, a crafted web request could result in uploads to arbitrary locations.
CVE-2020-5284 1 Zeit 1 Next.js 2020-04-01 5.0 MEDIUM 4.3 MEDIUM
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
CVE-2020-10696 2 Buildah Project, Redhat 3 Buildah, Enterprise Linux, Openshift Container Platform 2020-04-01 9.3 HIGH 8.8 HIGH
A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
CVE-2020-4240 1 Ibm 1 Spectrum Protect Plus 2020-03-31 6.4 MEDIUM 6.5 MEDIUM
IBM Spectrum Protect Plus 10.1.0 through 10.1.5 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to overwrite or create arbitrary files on the system. IBM X-Force ID: 175417.
CVE-2020-10953 1 Gitlab 1 Gitlab 2020-03-31 5.0 MEDIUM 7.5 HIGH
In GitLab EE 11.7 through 12.9, the NPM feature is vulnerable to a path traversal issue.
CVE-2015-8535 1 Lenovo 1 Solution Center 2020-03-31 7.2 HIGH 7.8 HIGH
MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A directory traversal vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow a user to execute arbitrary code with elevated privileges.
CVE-2020-5280 1 Typelevel 1 Http4s 2020-03-30 5.0 MEDIUM 7.5 HIGH
http4s before versions 0.18.26, 0.20.20, and 0.21.2 has a local file inclusion vulnerability. This vulnerability applies to all users of org.http4s.server.staticcontent.FileService, org.http4s.server.staticcontent.ResourceService and org.http4s.server.staticcontent.WebjarService. URI normalization is applied incorrectly. Requests whose path info contain ../ or // can expose resources outside of the configured location. This issue is patched in versions 0.18.26, 0.20.20, and 0.21.2. Note that 0.19.0 is a deprecated release and has never been supported.
CVE-2020-5554 1 Shihonkanri Plus Goout Project 1 Shihonkanri Plus Goout 2020-03-27 6.4 MEDIUM 9.1 CRITICAL
Directory traversal vulnerability in Shihonkanri Plus GOOUT Ver1.5.8 and Ver2.2.10 allows remote attackers to read and write arbitrary files via unspecified vectors.
CVE-2019-14751 1 Nltk 1 Nltk 2020-03-27 5.0 MEDIUM 7.5 HIGH
NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.
CVE-2020-10459 1 Chadhaajay 1 Phpkb 2020-03-26 4.0 MEDIUM 2.7 LOW
Path Traversal in admin/assetmanager/assetmanager.php (vulnerable function saved in admin/assetmanager/functions.php) in Chadha PHPKB Standard Multi-Language 9 allows attackers to list the files that are stored on the webserver using a dot-dot-slash sequence (../) via the POST parameter inpCurrFolder.
CVE-2020-10457 1 Chadhaajay 1 Phpkb 2020-03-26 4.0 MEDIUM 2.7 LOW
Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).
CVE-2020-10458 1 Chadhaajay 1 Phpkb 2020-03-26 5.5 MEDIUM 6.5 MEDIUM
Path Traversal in admin/imagepaster/operations.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to delete any folder on the webserver using a dot-dot-slash sequence (../) via the GET parameter crdir, when the GET parameter action is set to df, causing a Denial of Service.
CVE-2002-2154 1 Monkey-project 1 Monkey 2020-03-26 5.0 MEDIUM N/A
Directory traversal vulnerability in Monkey HTTP Daemon 0.1.4 allows remote attackers to read arbitrary files via .. (dot dot) sequences.
CVE-2014-6037 1 Zohocorp 1 Manageengine Eventlog Analyzer 2020-03-26 7.5 HIGH N/A
Directory traversal vulnerability in the agentUpload servlet in ZOHO ManageEngine EventLog Analyzer 9.0 build 9002 and 8.2 build 8020 allows remote attackers to execute arbitrary code by uploading a ZIP file which contains an executable file with .. (dot dot) sequences in its name, then accessing the executable via a direct request to the file under the web root. Fixed in Build 11072.
CVE-2020-10875 1 Zebra 2 Fx9500, Fx9500 Firmware 2020-03-25 5.0 MEDIUM 7.5 HIGH
Motorola FX9500 devices allow remote attackers to conduct absolute path traversal attacks, as demonstrated by PL/SQL Server Pages files such as /include/viewtagdb.psp.
CVE-2019-19486 1 Centreon 1 Centreon 2020-03-24 4.0 MEDIUM 6.5 MEDIUM
Local File Inclusion in minPlayCommand.php in Centreon (19.04.4 and below) allows an attacker to traverse paths via a plugin test.
CVE-2020-8131 1 Yarnpkg 1 Yarn 2020-03-24 5.1 MEDIUM 7.5 HIGH
Arbitrary filesystem write vulnerability in Yarn before 1.22.0 allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.
CVE-2019-3696 2 Opensuse, Suse 5 Leap, Pcp, Linux Enterprise High Performance Computing and 2 more 2020-03-24 4.4 MEDIUM 7.3 HIGH
A Improper Limitation of a Pathname to a Restricted Directory vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local user pcp to overwrite arbitrary files with arbitrary content. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
CVE-2019-16064 1 Netsas 1 Enigma Network Management Solution 2020-03-23 5.5 MEDIUM 9.6 CRITICAL
NETSAS Enigma NMS 65.0.0 and prior suffers from a directory traversal vulnerability that can allow an authenticated user to access files and directories stored outside of the web root folder. By exploiting this vulnerability, it is possible for an attacker to list operating-system directory contents on the server, create directories and upload files in permissible locations, and modify filenames and delete files that are accessible by the user running the web server instance.
CVE-2020-8600 1 Trendmicro 1 Worry-free Business Security 2020-03-20 7.5 HIGH 9.8 CRITICAL
Trend Micro Worry-Free Business Security (9.0, 9.5, 10.0) is affected by a directory traversal vulnerability that could allow an attacker to manipulate a key file to bypass authentication.
CVE-2018-18894 1 Lexmark 98 6500e, 6500e Firmware, C748 and 95 more 2020-03-20 5.0 MEDIUM 7.5 HIGH
Certain older Lexmark devices (C, M, X, and 6500e before 2018-12-18) contain a directory traversal vulnerability in the embedded web server.
CVE-2019-12182 1 Safescan 14 Ta-8010, Ta-8010 Firmware, Ta-8015 and 11 more 2020-03-20 7.5 HIGH 9.8 CRITICAL
Directory Traversal in Safescan Timemoto and TA-8000 series version 1.0 allows unauthenticated remote attackers to execute code via the administrative API.
CVE-2018-18576 1 Incsub 1 Hustle 2020-03-19 5.0 MEDIUM 5.3 MEDIUM
The Hustle (aka wordpress-popup) plugin through 6.0.5 for WordPress allows Directory Traversal to obtain a directory listing via the views/admin/dashboard/ URI.
CVE-2020-10564 1 Iptanus 1 Wordpress File Upload 2020-03-19 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the File Upload plugin before 4.13.0 for WordPress. A directory traversal can lead to remote code execution by uploading a crafted txt file into the lib directory, because of a wfu_include_lib call.
CVE-2019-13195 1 Kyocera 2 Ecosys M5526cdw, Ecosys M5526cdw Firmware 2020-03-19 5.0 MEDIUM 7.5 HIGH
The web application of some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was vulnerable to path traversal, allowing an unauthenticated user to retrieve arbitrary files, or check if files or folders existed within the file system.
CVE-2019-8903 1 Totaljs 1 Total.js 2020-03-18 5.0 MEDIUM 7.5 HIGH
index.js in Total.js Platform before 3.2.3 allows path traversal.
CVE-2020-10086 1 Gitlab 1 Gitlab 2020-03-17 5.0 MEDIUM 5.3 MEDIUM
GitLab 10.4 through 12.8.1 allows Directory Traversal. A particular endpoint was vulnerable to a directory traversal vulnerability, leading to arbitrary file read.
CVE-2020-10387 1 Chadhaajay 1 Phpkb 2020-03-16 4.0 MEDIUM 4.9 MEDIUM
Path Traversal in admin/download.php in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to download files from the server using a dot-dot-slash sequence (../) via the GET parameter file.
CVE-2014-10066 1 Fancy-server Project 1 Fancy-server 2020-03-13 5.0 MEDIUM 7.5 HIGH
Versions less than 0.1.4 of the static file server module fancy-server are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory.
CVE-2020-6203 1 Sap 1 Netweaver 2020-03-12 6.4 MEDIUM 9.1 CRITICAL
SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal.
CVE-2019-0225 1 Apache 1 Jspwiki 2020-03-09 7.8 HIGH 7.5 HIGH
A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details.
CVE-2020-2139 1 Jenkins 1 Cobertura 2020-03-09 8.5 HIGH 6.5 MEDIUM
An arbitrary file write vulnerability in Jenkins Cobertura Plugin 1.15 and earlier allows attackers able to control the coverage report file contents to overwrite any file on the Jenkins master file system.
CVE-2020-9364 1 Creative-solutions 1 Creative Contact Form 2020-03-09 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in helpers/mailer.php in the Creative Contact Form extension 4.6.2 before 2019-12-03 for Joomla!. A directory traversal vulnerability resides in the filename field for uploaded attachments via the creativecontactform_upload parameter. An attacker could exploit this vulnerability with the "Send me a copy" option to receive any files of the filesystem via email.
CVE-2020-5405 1 Vmware 1 Spring Cloud Config 2020-03-07 4.3 MEDIUM 6.5 MEDIUM
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.