CVE-2024-7928
MEDIUM EXPLOITED NUCLEIFastadmin < 1.3.4.20220530 - Path Traversal
Title source: ruleDescription
A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.
Exploits (6)
Nuclei Templates (1)
FastAdmin < V1.3.4.20220530 - Path Traversal
MEDIUMby s4e-io,Hel10-Web
FOFA:
icon_hash="-1036943727"
References (4)
Scores
CVSS v3
4.3
EPSS
0.9180
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
VulnCheck KEV
2024-08-29
CWE
CWE-22
Status
published
Products (1)
fastadmin/fastadmin
< 1.3.4.20220530
Published
Aug 19, 2024
Tracked Since
Feb 18, 2026