A vulnerability has been found in SUKOHI Surpass and classified as critical. This vulnerability affects unknown code of the file src/Sukohi/Surpass/Surpass.php. The manipulation of the argument dir leads to pathname traversal. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as d22337d453a2a14194cdb02bf12cdf9d9f827aa7. It is recommended to upgrade the affected component. VDB-217642 is the identifier assigned to this vulnerability.
References
Link Resource
https://github.com/SUKOHI/Surpass/commit/d22337d453a2a14194cdb02bf12cdf9d9f827aa7 Patch Third Party Advisory
https://github.com/SUKOHI/Surpass/releases/tag/1.0.0 Release Notes Third Party Advisory
https://vuldb.com/?ctiid.217642 Permissions Required Third Party Advisory
https://vuldb.com/?id.217642 Permissions Required Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2023-01-08T09:27:12.135Z

Updated: 2023-10-20T07:55:24.511Z

Reserved: 2023-01-08T09:26:00.394Z


Link: CVE-2015-10030

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-01-08T10:15:11.537

Modified: 2024-05-17T01:02:59.730


Link: CVE-2015-10030

JSON object: View

cve-icon Redhat Information

No data.