First published: Fri Feb 02 2024(Updated: )
MRCMS 3.0 contains an Arbitrary File Read vulnerability in /admin/file/edit.do as the incoming path parameter is not filtered.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mrcms | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24161 is classified as a high severity vulnerability due to its potential for arbitrary file read attacks.
To mitigate CVE-2024-24161, validate and sanitize all incoming path parameters in the /admin/file/edit.do endpoint.
CVE-2024-24161 is an Arbitrary File Read vulnerability that allows unauthorized access to sensitive files.
CVE-2024-24161 affects MRCMS version 3.0.
You can check for CVE-2024-24161 vulnerability by testing if the application allows reading of arbitrary files through the /admin/file/edit.do endpoint.