Lucene search

K
cveDIVDCVE-2024-21877
HistoryAug 12, 2024 - 1:38 p.m.

CVE-2024-21877

2024-08-1213:38:14
CWE-22
DIVD
web.nvd.nist.gov
34
cve-2024-21877
path traversal
file manipulation
authentication required
envoy vulnerability

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS4

9.2

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/SC:L/VI:H/SI:L/VA:H/SA:L/S:P/AU:Y/R:I/V:C/RE:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

21.7%

Improper Limitation of a Pathname to a Restricted Directory (β€˜Path Traversal’) vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authentication.This issue affects Envoy: from 4.x to 8.0 andΒ < 8.2.4225.

Affected configurations

Nvd
Node
enphaseiq_gateway_firmwareRange4.0–8.2.4225
AND
enphaseiq_gatewayMatch-

CNA Affected

[
  {
    "vendor": "Enphase",
    "product": "Envoy",
    "versions": [
      {
        "status": "affected",
        "version": "8.0",
        "lessThan": "8.2.4225",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "7.x",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "6.x",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "5.x",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "4.x",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS4

9.2

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/SC:L/VI:H/SI:L/VA:H/SA:L/S:P/AU:Y/R:I/V:C/RE:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

21.7%

Related for CVE-2024-21877