RaspAP (aka raspap-webgui) through 3.0.9 allows remote attackers to read the /etc/passwd file via a crafted request.
References
Link | Resource |
---|---|
https://dustri.org/b/carrot-disclosure.html | Exploit Third Party Advisory |
https://dustri.org/b/carrot-disclosure.html | Exploit Third Party Advisory |
Configurations
History
01 May 2025, 00:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://dustri.org/b/carrot-disclosure.html - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
First Time |
Raspap
Raspap raspap |
21 Nov 2024, 09:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://dustri.org/b/carrot-disclosure.html - |
14 Nov 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
09 Mar 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-09 00:15
Updated : 2025-05-01 00:17
NVD link : CVE-2024-28753
Mitre link : CVE-2024-28753
CVE.ORG link : CVE-2024-28753
JSON object : View
Products Affected
raspap
- raspap
CWE