CVE-2019-10767

An attacker can include file contents from outside the `/adapter/xxx/` directory, where `xxx` is the name of an existent adapter like "admin". It is exploited using the administrative web panel with a request for an adapter file. **Note:** The attacker has to be logged in if the authentication is enabled (by default isn't enabled).
Configurations

Configuration 1 (hide)

cpe:2.3:a:iobroker:iobroker.js-controller:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 04:19

Type Values Removed Values Added
References () https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda - Patch, Third Party Advisory () https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda - Patch, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881 - Exploit, Third Party Advisory

Information

Published : 2019-11-21 17:15

Updated : 2024-11-21 04:19


NVD link : CVE-2019-10767

Mitre link : CVE-2019-10767

CVE.ORG link : CVE-2019-10767


JSON object : View

Products Affected

iobroker

  • iobroker.js-controller
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')