CVE-2023-35844
HIGH EXPLOITED NUCLEILightdash < 0.510.3 - Path Traversal
Title source: ruleDescription
packages/backend/src/routers in Lightdash before 0.510.3 has insecure file endpoints, e.g., they allow .. directory traversal and do not ensure that an intended file extension (.csv or .png) is used.
Exploits (2)
Nuclei Templates (1)
Lightdash version <= 0.510.3 Arbitrary File Read
HIGHVERIFIEDby dwisiswant0
Shodan:
title:"Lightdash" || http.title:"lightdash"
FOFA:
title="lightdash"
References (4)
Scores
CVSS v3
7.5
EPSS
0.9234
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-12-04
CWE
CWE-22
Status
published
Products (1)
lightdash/lightdash
< 0.510.3
Published
Jun 19, 2023
Tracked Since
Feb 18, 2026