CVE-2023-47313

Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal. The application uses an API call to move the uploaded temporary file to the file directory during the file upload process. This API call receives two input parameters, such as path and localPath. The first one refers to the temporary file with an absolute path without validating it. Attackers may modify this API call by referring to arbitrary files. As a result, arbitrary files can be moved to the files directory and so they can be downloaded.
References
Link Resource
https://boltonshield.com/en/cve/cve-2023-47313/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:h-mdm:headwind_mdm:5.22.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-11-22 17:15

Updated : 2023-11-30 21:15


NVD link : CVE-2023-47313

Mitre link : CVE-2023-47313

CVE.ORG link : CVE-2023-47313


JSON object : View

Products Affected

h-mdm

  • headwind_mdm
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')