icon

We found results for “

CVE-2021-43674

Good to know:

icon

Date: December 3, 2021

ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

Top Fix

icon

Upgrade Version

Upgrade to version bedita/bedita - 3.2.0;bedita/bedita - dev-dependabot/github_actions/docker/login-action-3;ec-cube2/ec-cube2 - 2.13.0;hi-media/padocc-engine - v2.0.0;ec-cube/ec-cube - dev-dependabot/composer/composer/composer-2.6.4;ec-cube/ec-cube - eccube-2.13.0-beta;benkeen/generatedata - 3.0.0-alpha1;tpruvot/gitphp-repo - 0.2.4-tpr;tpruvot/gitphp-repo - 0.2.5-tpr;sifophp/sifo - dev-MDI-1466-1;sifophp/sifo - sifo-2.2;bacula-web/bacula-web - v5.2.11

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us