CVE-2024-11664

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-11664
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-11664.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-11664
Published
2024-11-25T09:15:06Z
Modified
2025-01-14T19:46:52Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability, which was classified as critical, has been found in eNMS up to 4.2. Affected by this issue is the function multiselect_filtering of the file eNMS/controller.py of the component TGZ File Handler. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 22b0b443acca740fc83b5544165c1f53eff3f529. It is recommended to apply a patch to fix this issue.

References

Affected packages

Git / github.com/enms-automation/enms

Affected ranges

Type
GIT
Repo
https://github.com/enms-automation/enms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed