Path Traversal Affecting yetiforce/yetiforce-crm package, versions <6.5.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Path Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-YETIFORCEYETIFORCECRM-6249453
  • published16 Feb 2024
  • disclosed16 Feb 2024
  • creditVinicius Silva

Introduced: 16 Feb 2024

CVE-2023-49508  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade yetiforce/yetiforce-crm to version 6.5.0 or higher.

Overview

yetiforce/yetiforce-crm is an an open and innovative CRM system. Our team created for you one of the most innovative CRM systems that supports mainly business processes and allows for customization according to your needs. Be ahead of your competition and implement YetiForce!

Affected versions of this package are vulnerable to Path Traversal due to improper sanitization of the license parameter in the LibraryLicense.php component. An attacker can obtain sensitive information by exploiting the directory traversal vulnerability.

Note: This only affects .txt files.

CVSS Scores

version 3.1