Vulnerability Database
Blog
FAQ
Docs
CVE-2023-33747
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-33747
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-33747.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-33747
Published
2023-06-06T18:15:11Z
Modified
2025-01-08T17:45:27.690184Z
Severity
7.8 (High)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
[none]
Details
CloudPanel v2.2.2 allows attackers to execute a path traversal.
References
http://packetstormsecurity.com/files/172768/CloudPanel-2.2.2-Privilege-Escalation-Path-Traversal.html
https://github.com/EagleTube/CloudPanel
https://cwe.mitre.org/data/definitions/264.html
https://cwe.mitre.org/data/definitions/269.html
https://cwe.mitre.org/data/definitions/35.html
https://www.cloudpanel.io/docs/v2/changelog/
Affected packages
Git
/
github.com/cloudpanel-io/cloudpanel-ce
Affected ranges
Type
GIT
Repo
https://github.com/cloudpanel-io/cloudpanel-ce
Events
Introduced
3af11e531206d2c05a206c34c039547ccdd3d1d7
Last affected
3e154cf3de190507b67868de58cf36d69e48de9c
Affected versions
v2.*
v2.0.0
v2.0.1
v2.0.2
v2.0.3
v2.0.4
v2.1.0
v2.2.0
v2.2.1
v2.2.2
CVE-2023-33747 - OSV