Directory Traversal vulnerability in codesiddhant Jasmin Ransomware v.1.0.1 allows an attacker to obtain sensitive information via the download_file.php component.
References
| Link | Resource |
|---|---|
| https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc | Exploit Issue Tracking Third Party Advisory |
| https://github.com/codesiddhant/Jasmin-Ransomware | Product |
| https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc | Exploit Issue Tracking Third Party Advisory |
| https://github.com/codesiddhant/Jasmin-Ransomware | Product |
Configurations
History
14 Nov 2025, 16:40
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:codesiddhant:jasmin-ransomware:1.0.1:*:*:*:*:*:*:* | |
| First Time |
Codesiddhant
Codesiddhant jasmin-ransomware |
|
| References | () https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://github.com/codesiddhant/Jasmin-Ransomware - Product |
25 Nov 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-22 |
21 Nov 2024, 09:12
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc - | |
| References | () https://github.com/codesiddhant/Jasmin-Ransomware - |
03 May 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-03 17:15
Updated : 2025-11-14 16:40
NVD link : CVE-2024-30851
Mitre link : CVE-2024-30851
CVE.ORG link : CVE-2024-30851
JSON object : View
Products Affected
codesiddhant
- jasmin-ransomware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
