CVE-2024-6789
UNKNOWN
Published 2024-08-27T09:57:00.441Z
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2024-6789. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
A path traversal issue in API endpoint in M-Files Server before version 24.8.13981.0 and LTS 24.2.13421.15 SR2 and LTS 23.8.12892.0 SR6 allows authenticated user to read files
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
⚠ Unreviewed
HIGH
GHSA-28pw-27gw-65v8
Advisory Details
A path traversal issue in API endpoint in M-Files Server before version 24.8.13981.0 allows authenticated user to read files
CVSS Scoring
CVSS Score
7.5
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: August 27, 2024, Modified: September 7, 2024
Published: 2024-08-27T09:57:00.441Z
Last Modified: 2024-09-16T06:19:05.367Z
Copied to clipboard!