An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file
References
Link | Resource |
---|---|
https://gist.github.com/nyxfqq/a5a2fc5147a1b34538e1ac05a3e56910 | Third Party Advisory |
Configurations
History
15 Aug 2024, 13:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/nyxfqq/a5a2fc5147a1b34538e1ac05a3e56910 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-327 | |
CPE | cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:* | |
First Time |
Beego beego
Beego |
31 Jul 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-31 21:15
Updated : 2024-08-15 13:11
NVD link : CVE-2024-40465
Mitre link : CVE-2024-40465
JSON object : View
Products Affected
beego
- beego
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm