CVE-2017-20178

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-20178
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-20178.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-20178
Aliases
Published
2023-02-21T18:15:11Z
Modified
2024-10-12T02:41:43.853264Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

* UNSUPPORTED WHEN ASSIGNED * A vulnerability was found in Codiad 2.8.0. It has been rated as problematic. Affected by this issue is the function saveJSON of the file components/install/process.php. The manipulation of the argument data leads to information disclosure. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 2.8.1 is able to address this issue. The patch is identified as 517119de673e62547ee472a730be0604f44342b5. It is recommended to upgrade the affected component. VDB-221498 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

References

Affected packages

Git / github.com/codiad/codiad

Affected ranges

Type
GIT
Repo
https://github.com/codiad/codiad
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v.*

v.1.0.0
v.1.0.1
v.1.1.0
v.1.1.1
v.1.1.3
v.1.1.4
v.1.1.5
v.1.1.6
v.1.2.0
v.1.2.1
v.1.3.0
v.1.3.1
v.1.3.10
v.1.3.11
v.1.3.12
v.1.3.13
v.1.3.2
v.1.3.3
v.1.3.5
v.1.3.8
v.1.4.0
v.1.4.1
v.1.4.2
v.1.4.3
v.1.5.0
v.1.5.1
v.1.6.0
v.1.7.0
v.1.7.5
v.1.7.8
v.1.7.9
v.1.8.0
v.1.8.1
v.1.8.2
v.1.8.3
v.1.8.4
v.1.9.0
v.1.9.1
v.1.9.2
v.2.0.0
v.2.0.2
v.2.0.4
v.2.0.6
v.2.0.7
v.2.1.0
v.2.1.3
v.2.1.4
v.2.1.6
v.2.1.7
v.2.1.8
v.2.1.9
v.2.2.1
v.2.2.2
v.2.2.3
v.2.2.4
v.2.2.5
v.2.2.6
v.2.2.7
v.2.2.8
v.2.2.9
v.2.3.0
v.2.3.1
v.2.3.2
v.2.3.3
v.2.3.4
v.2.3.5
v.2.3.6
v.2.3.7
v.2.3.8
v.2.3.9
v.2.4.0
v.2.4.1
v.2.4.2
v.2.4.3
v.2.5.0
v.2.5.1
v.2.5.2
v.2.5.3
v.2.5.4
v.2.6.0
v.2.6.1
v.2.6.2
v.2.6.3
v.2.6.4
v.2.6.5
v.2.6.6
v.2.7.0
v.2.7.1
v.2.7.2
v.2.7.4
v.2.7.5

v1.*

v1.0.0
v1.3.6