A vulnerability classified as critical has been found in Shibang Communications IP Network Intercom Broadcasting System 1.0. This affects an unknown part of the file /php/busyscreenshotpush.php. The manipulation of the argument jsondata[callee]/jsondata[imagename] leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259065 was assigned to this vulnerability.
References
Configurations
No configuration.
History
21 Nov 2024, 09:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/garboa/cve_3/blob/main/file_put_content.md - | |
References | () https://vuldb.com/?ctiid.259065 - | |
References | () https://vuldb.com/?id.259065 - | |
References | () https://vuldb.com/?submit.308510 - |
03 Apr 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-03 00:15
Updated : 2024-11-21 09:29
NVD link : CVE-2024-3218
Mitre link : CVE-2024-3218
CVE.ORG link : CVE-2024-3218
JSON object : View
Products Affected
No product.
CWE
CWE-24
Path Traversal: '../filedir'