Directory Traversal in File Upload in Gleamtech FileVista 9.2.0.0 allows remote attackers to achieve Code Execution, Information Disclosure, and Escalation of Privileges via injecting malicious payloads in HTTP requests to manipulate file paths, bypass access controls, and upload malicious files.
References
Link | Resource |
---|---|
https://packetstorm.news/files/id/189021 | Exploit Third Party Advisory |
https://www.gleamtech.com/filevista | Product |
Configurations
History
15 Sep 2025, 18:06
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gleamtech filevista
Gleamtech |
|
References | () https://packetstorm.news/files/id/189021 - Exploit, Third Party Advisory | |
References | () https://www.gleamtech.com/filevista - Product | |
CPE | cpe:2.3:a:gleamtech:filevista:9.2.0:*:*:*:*:*:*:* | |
Summary |
|
10 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
CWE | CWE-22 |
07 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-07 16:15
Updated : 2025-09-15 18:06
NVD link : CVE-2024-57248
Mitre link : CVE-2024-57248
CVE.ORG link : CVE-2024-57248
JSON object : View
Products Affected
gleamtech
- filevista
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')