First published: Tue Aug 08 2023(Updated: )
Insufficient parameter validation in the Foswiki::Sandbox component of Foswiki v2.1.7 and below allows attackers to perform a directory traversal via supplying a crafted web request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foswiki | >=2.0.0<=2.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24698 is considered a high severity vulnerability due to potential exploitation leading to directory traversal.
To fix CVE-2023-24698, upgrade Foswiki to version 2.1.8 or later which addresses the insufficient parameter validation.
Exploiting CVE-2023-24698 could allow attackers to access sensitive files in the system through directory traversal.
CVE-2023-24698 affects Foswiki versions 2.1.7 and below.
CVE-2023-24698 allows directory traversal due to insufficient validation of user-supplied parameters in the Foswiki::Sandbox component.