CVE-2024-39332

Webswing 23.2.2 allows remote attackers to modify client-side JavaScript code to achieve path traversal, likely leading to remote code execution via modification of shell scripts on the server.
References
Link Resource
https://herolab.usd.de/security-advisories/usd-2024-0008/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:webswing:webswing:23.2.2:*:*:*:-:*:*:*

History

10 Jul 2025, 19:35

Type Values Removed Values Added
Summary
  • (es) Webswing 23.2.2 permite a atacantes remotos modificar el código JavaScript del lado del cliente para lograr el path traversal, lo que probablemente conduce a la ejecución remota de código a través de la modificación de shell scripts en el servidor.
References () https://herolab.usd.de/security-advisories/usd-2024-0008/ - () https://herolab.usd.de/security-advisories/usd-2024-0008/ - Exploit, Third Party Advisory
First Time Webswing webswing
Webswing
CPE cpe:2.3:a:webswing:webswing:23.2.2:*:*:*:-:*:*:*

01 Nov 2024, 16:35

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

31 Oct 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-31 19:15

Updated : 2025-07-10 19:35


NVD link : CVE-2024-39332

Mitre link : CVE-2024-39332

CVE.ORG link : CVE-2024-39332


JSON object : View

Products Affected

webswing

  • webswing
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')