First published: Fri May 03 2024(Updated: )
LG SuperSign Media Editor ContentRestController getObject Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of LG SuperSign Media Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getObject method implemented in the ContentRestController class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-20328.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
LG SuperSign Media Editor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40517 is classified as a medium severity vulnerability.
To fix CVE-2023-40517, update the LG SuperSign Media Editor to the latest version provided by LG.
CVE-2023-40517 is a directory traversal information disclosure vulnerability.
CVE-2023-40517 affects installations of the LG SuperSign Media Editor.
No, authentication is not required to exploit CVE-2023-40517.