Description
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.
Remediation
References
https://github.com/GladysAssistant/Gladys/commit/f27d0ea4689c3deca5739b5f9ed45a2ddbf00b7b
https://blog.moku.fr/cves/CVE-unassigned/
https://blog.moku.fr/cves/CVE-2023-43256/
Related Vulnerabilities
CVE-2021-27644 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-server
CVE-2022-24697 Vulnerability in maven package org.apache.kylin:kylin-core-common
CVE-2022-42466 Vulnerability in maven package org.apache.isis.core:isis-applib
CVE-2012-0803 Vulnerability in maven package org.apache.cxf:cxf-rt-ws-security
CVE-2018-25031 Vulnerability in maven package org.webjars:swagger-ui