smanga 3.2.7 does not filter the file parameter at the PHP/get file flow.php interface, resulting in a path traversal vulnerability that can cause arbitrary file reading.
References
| Link | Resource |
|---|---|
| https://github.com/vulreport3r/cve-reports/blob/main/Smanga_has_an_arbitrary_file_read_vulnerability/report.md | Exploit Third Party Advisory |
| https://github.com/vulreport3r/cve-reports/blob/main/Smanga_has_an_arbitrary_file_read_vulnerability/report.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-05-20 18:15
Updated : 2026-02-27 03:37
NVD link : CVE-2024-34193
Mitre link : CVE-2024-34193
CVE.ORG link : CVE-2024-34193
JSON object : View
Products Affected
lkw199711
- smanga
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
