CVE-2024-57176

An issue in the shiroFilter function of White-Jotter project v0.2.2 allows attackers to execute a directory traversal and access sensitive endpoints via a crafted URL.
References
Link Resource
https://github.com/DYX217/Incorrect-Access-Control Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:antabot:white-jotter:0.2.2:*:*:*:*:*:*:*

History

21 Aug 2025, 21:51

Type Values Removed Values Added
References () https://github.com/DYX217/Incorrect-Access-Control - () https://github.com/DYX217/Incorrect-Access-Control - Exploit, Third Party Advisory
First Time Antabot
Antabot white-jotter
CPE cpe:2.3:a:antabot:white-jotter:0.2.2:*:*:*:*:*:*:*

17 Mar 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.6
Summary
  • (es) Un problema en la función shiroFilter de White-Jotter project v0.2.2 permite a los atacantes ejecutar un directory traversal y acceder a endpoints sensibles a través de una URL manipulada específicamente para ello.
CWE CWE-437

21 Feb 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-21 18:15

Updated : 2025-08-21 21:51


NVD link : CVE-2024-57176

Mitre link : CVE-2024-57176

CVE.ORG link : CVE-2024-57176


JSON object : View

Products Affected

antabot

  • white-jotter
CWE
CWE-437

Incomplete Model of Endpoint Features