Directory Traversal vulnerability in codesiddhant Jasmin Ransomware v.1.0.1 allows an attacker to obtain sensitive information via the download_file.php component.
References
| Link | Resource |
|---|---|
| https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc | Exploit Issue Tracking Third Party Advisory |
| https://github.com/codesiddhant/Jasmin-Ransomware | Product |
| https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc | Exploit Issue Tracking Third Party Advisory |
| https://github.com/codesiddhant/Jasmin-Ransomware | Product |
Configurations
History
14 Nov 2025, 16:40
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Codesiddhant
Codesiddhant jasmin-ransomware |
|
| CPE | cpe:2.3:a:codesiddhant:jasmin-ransomware:1.0.1:*:*:*:*:*:*:* | |
| References | () https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://github.com/codesiddhant/Jasmin-Ransomware - Product |
Information
Published : 2024-05-03 17:15
Updated : 2025-11-14 16:40
NVD link : CVE-2024-30851
Mitre link : CVE-2024-30851
CVE.ORG link : CVE-2024-30851
JSON object : View
Products Affected
codesiddhant
- jasmin-ransomware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
