{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-23822","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-01-22T22:23:54.337Z","datePublished":"2024-01-29T15:46:30.188Z","dateUpdated":"2025-05-29T15:09:09.974Z"},"containers":{"cna":{"title":"Thruk Incorrect limitation of a pathname to a restricted directory (Path Traversal) (CWE-22)","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx","tags":["x_refsource_CONFIRM"],"url":"https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx"},{"name":"https://github.com/sni/Thruk/commit/1aa9597cdf2722a69651124f68cbb449be12cc39","tags":["x_refsource_MISC"],"url":"https://github.com/sni/Thruk/commit/1aa9597cdf2722a69651124f68cbb449be12cc39"}],"affected":[{"vendor":"sni","product":"Thruk","versions":[{"version":"< 3.12","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-01-29T15:46:30.188Z"},"descriptions":[{"lang":"en","value":"Thruk is a multibackend monitoring webinterface.  Prior to 3.12, the Thruk web monitoring application presents a vulnerability in a file upload form that allows a threat actor to arbitrarily upload files to the server to any path they desire and have permissions for. This vulnerability is known as Path Traversal or Directory Traversal. Version 3.12 fixes the issue.\n"}],"source":{"advisory":"GHSA-4mrh-mx7x-rqjx","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T23:13:08.393Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx"},{"name":"https://github.com/sni/Thruk/commit/1aa9597cdf2722a69651124f68cbb449be12cc39","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/sni/Thruk/commit/1aa9597cdf2722a69651124f68cbb449be12cc39"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-08T15:38:40.514316Z","id":"CVE-2024-23822","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-29T15:09:09.974Z"}}]}}