Path Traversal in 626
High severity
GitHub Reviewed
Published
Sep 1, 2020
to the GitHub Advisory Database
•
Updated Jun 1, 2023
Description
Published by the National Vulnerability Database
Jun 7, 2018
Reviewed
Aug 31, 2020
Published to the GitHub Advisory Database
Sep 1, 2020
Last updated
Jun 1, 2023
All versions of
626
are vulnerable to path traversal. This enables a remote attacker to read arbitrary files from the remote server using this module.Recommendation
No fix is currently available for this vulnerability.
It is our recommendation to not install or use this module at this time.
References