Description
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.
Remediation
References
https://blog.moku.fr/cves/CVE-2023-43256/
https://blog.moku.fr/cves/CVE-unassigned/
https://github.com/GladysAssistant/Gladys/commit/f27d0ea4689c3deca5739b5f9ed45a2ddbf00b7b
Related Vulnerabilities
CVE-2021-39194 Vulnerability in maven package com.charleskorn.kaml:kaml
CVE-2021-4245 Vulnerability in npm package rfc6902
CVE-2020-8203 Vulnerability in maven package org.webjars.bower:lodash
CVE-2020-14966 Vulnerability in maven package org.webjars.npm:jsrsasign
CVE-2018-16479 Vulnerability in npm package http-live-simulator