CVE-2024-34193
High
|7.5No Exploit
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to read any file on the server by manipulating the file parameter in a specific PHP interface. It occurs in version 3.2.7 of smanga and does not require any special access, making it a significant risk for exposed systems.
Technical Description
smanga 3.2.7 does not filter the file parameter at the PHP/get file flow.php interface, resulting in a path traversal vulnerability that can cause arbitrary file reading.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 647 days
Quick Information
Published
May 20, 2024
almost 2 years ago
Last Modified
Feb 27, 2026
about 1 month ago
Vendor
lkw199711
Product
smanga