An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file
References
| Link | Resource |
|---|---|
| https://gist.github.com/nyxfqq/a5a2fc5147a1b34538e1ac05a3e56910 | Third Party Advisory |
Configurations
History
15 Aug 2024, 13:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/nyxfqq/a5a2fc5147a1b34538e1ac05a3e56910 - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CWE | CWE-327 | |
| CPE | cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:* | |
| First Time |
Beego beego
Beego |
31 Jul 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-07-31 21:15
Updated : 2024-08-15 13:11
NVD link : CVE-2024-40465
Mitre link : CVE-2024-40465
JSON object : View
Products Affected
beego
- beego
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
