Vulnerability Description
The Weave server API allows remote users to fetch files from a specific directory, but due to a lack of input validation, it is possible to traverse and leak arbitrary files remotely. In various common scenarios, this allows a low-privileged user to assume the role of the server admin.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/wandb/weave/pull/1657
- https://research.jfrog.com/vulnerabilities/wandb-weave-server-remote-arbitrary-f
FAQ
What is CVE-2024-7340?
CVE-2024-7340 is a vulnerability with a CVSS score of 8.8 (HIGH). The Weave server API allows remote users to fetch files from a specific directory, but due to a lack of input validation, it is possible to traverse and leak arbitrary files remotely. In various commo...
How severe is CVE-2024-7340?
CVE-2024-7340 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7340?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.