Description
A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely.
References (3)
Core 3
Core References
Exploit, Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/fulldisclosure/2017/Feb/58
Exploit, Third Party Advisory x_refsource_misc
https://youtu.be/Xc6Jg9I7Pj4
Third Party Advisory x_refsource_misc
https://vuldb.com/?id.97275
Scores
CVSS v3
3.5
EPSS
0.0014
EPSS Percentile
33.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-639
CWE-200
Status
published
Products (1)
projectsend/projectsend
r754
Published
Jun 27, 2022
Tracked Since
Feb 18, 2026