Directory Traversal vulnerability in YetiForceCompany YetiForceCRM versions 6.4.0 and before allows a remote authenticated attacker to obtain sensitive information via the license parameter in the LibraryLicense.php component.
References
| Link | Resource |
|---|---|
| https://github.com/YetiForceCompany/YetiForceCRM/commit/ba3a348aa6ecdf0a1d8b289cbb679bebcda7a132 | Patch |
| https://github.com/c4v4r0n/Research/tree/main/CVE-2023-49508 | Third Party Advisory |
| https://huntr.com/bounties/29ed641d-eb03-4532-aed4-f96e11f78983/ | Permissions Required |
| https://github.com/YetiForceCompany/YetiForceCRM/commit/ba3a348aa6ecdf0a1d8b289cbb679bebcda7a132 | Patch |
| https://github.com/c4v4r0n/Research/tree/main/CVE-2023-49508 | Third Party Advisory |
| https://huntr.com/bounties/29ed641d-eb03-4532-aed4-f96e11f78983/ | Permissions Required |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-02-16 08:15
Updated : 2025-03-27 15:15
NVD link : CVE-2023-49508
Mitre link : CVE-2023-49508
CVE.ORG link : CVE-2023-49508
JSON object : View
Products Affected
yetiforce
- yetiforce_customer_relationship_management
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
