Directory Traversal in File Upload in Gleamtech FileVista 9.2.0.0 allows remote attackers to achieve Code Execution, Information Disclosure, and Escalation of Privileges via injecting malicious payloads in HTTP requests to manipulate file paths, bypass access controls, and upload malicious files.
References
Link | Resource |
---|---|
https://packetstorm.news/files/id/189021 | Exploit Third Party Advisory |
https://www.gleamtech.com/filevista | Product |
Configurations
History
15 Sep 2025, 18:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gleamtech:filevista:9.2.0:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://packetstorm.news/files/id/189021 - Exploit, Third Party Advisory | |
References | () https://www.gleamtech.com/filevista - Product | |
First Time |
Gleamtech
Gleamtech filevista |
10 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
CWE | CWE-22 |
07 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-07 16:15
Updated : 2025-09-15 18:06
NVD link : CVE-2024-57248
Mitre link : CVE-2024-57248
CVE.ORG link : CVE-2024-57248
JSON object : View
Products Affected
gleamtech
- filevista
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')