29 Sep 2023
Vulnérabilité CVE-2023-5257 CVE Vulnerability
A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability. (CVSS:3.5) (Last Update:2023-09-29 12:45:25)
Vulnerability Details :
A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability.
Vulnerability category:Directory traversal
Exploit prediction scoring system (EPSS) score for CVE-2023-5257
We don't have an EPSS score for this CVE yet EPSS FAQ
CVSS scores for CVE-2023-5257
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
2.7 | LOW | AV:A/AC:L/Au:S/C:N/I:N/A:P | 5.1 | 2.9 | [email protected] |
3.5 | LOW | CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L | 2.1 | 1.4 | [email protected] |
CWE ids for CVE-2023-5257
- The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: [email protected] (Primary)