IBM Concert Software 1.0.0 through 1.0.5 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
History

Fri, 02 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 02 May 2025 01:15:00 +0000

Type Values Removed Values Added
Description IBM Concert Software 1.0.0 through 1.0.5 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Title IBM Concert Software path traversal
First Time appeared Ibm
Ibm concert
Weaknesses CWE-22
CPEs cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:concert:1.0.5:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm concert
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published: 2025-05-02T00:38:03.219Z

Updated: 2025-05-02T12:22:43.017Z

Reserved: 2024-12-12T18:07:25.452Z

Link: CVE-2024-55913

cve-icon Vulnrichment

Updated: 2025-05-02T12:22:39.285Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-02T01:15:54.140

Modified: 2025-05-02T13:52:51.693

Link: CVE-2024-55913

cve-icon Redhat

No data.