Path traversal in M-Files API

अनुवाद हो रहा है…

प्लेटफ़ॉर्म

other

घटक

m-files-server

में ठीक किया गया

24.8.13981.0

LTS 24.2.13421.15 SR2

LTS 23.8.12892.0 SR6

AI Confidence: highNVDEPSS 0.9%समीक्षित: मई 2026
आपकी भाषा में अनुवाद हो रहा है…

CVE-2024-6789 describes a path traversal vulnerability discovered in M-Files Server. This flaw allows an authenticated user to read files outside of the intended directory, potentially exposing sensitive data. The vulnerability affects versions prior to LTS 24.2.13421.15 SR2 and LTS 23.8.12892.0 SR6. A fix is available in LTS 24.2.13421.15 SR2.

प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…

The impact of this path traversal vulnerability is significant, as it allows an authenticated user to bypass access controls and read arbitrary files on the server. An attacker could potentially access configuration files, database credentials, or other sensitive data stored on the system. This could lead to data breaches, privilege escalation, and further compromise of the M-Files Server environment. The ability to read files outside the intended directory represents a serious security risk, particularly if the server stores confidential information.

शोषण संदर्भअनुवाद हो रहा है…

CVE-2024-6789 was publicly disclosed on August 27, 2024. There is currently no indication of active exploitation or KEV listing. Public proof-of-concept code is not yet available, but the path traversal nature of the vulnerability suggests that it could be relatively easy to exploit once a PoC is developed. Monitor security advisories and threat intelligence feeds for updates.

कौन जोखिम में हैअनुवाद हो रहा है…

Organizations utilizing M-Files Server with versions prior to LTS 24.2.13421.15 SR2 and LTS 23.8.12892.0 SR6 are at risk. This includes deployments where user authentication is enabled and file access permissions are not strictly enforced. Shared hosting environments utilizing M-Files Server are particularly vulnerable.

हमले की समयरेखा

  1. Disclosure

    disclosure

खतरा खुफिया

एक्सप्लॉइट स्थिति

प्रूफ ऑफ कॉन्सेप्टअज्ञात
CISA KEVNO

EPSS

0.92% (76% शतमक)

CISA SSVC

शोषणnone
स्वचालनीयno
तकनीकी प्रभावpartial

प्रभावित सॉफ्टवेयर

घटकm-files-server
विक्रेताM-Files Corporation
प्रभावित श्रेणीमें ठीक किया गया
0 – 24.8.13980.024.8.13981.0
LTS 24.2.0 – LTS 24.2.13421.14 SR2LTS 24.2.13421.15 SR2
LTS 23.8.0 – LTS 23.8.12891.0 SR6LTS 23.8.12892.0 SR6

कमजोरी वर्गीकरण (CWE)

समयरेखा

  1. आरक्षित
  2. प्रकाशित
  3. संशोधित
  4. EPSS अद्यतन

शमन और वर्कअराउंडअनुवाद हो रहा है…

The primary mitigation for CVE-2024-6789 is to upgrade M-Files Server to version LTS 24.2.13421.15 SR2 or later. Prior to upgrading, it is recommended to review the M-Files Server release notes for any potential compatibility issues or breaking changes. Consider implementing stricter access controls and file permissions to limit the potential impact of this vulnerability, even after patching. Regularly audit file system access logs to detect any suspicious activity.

कैसे ठीक करेंअनुवाद हो रहा है…

Actualice M-Files Server a la versión 24.8.13981.0, LTS 24.2.13421.15 SR2 o LTS 23.8.12892.0 SR6, o posterior, según corresponda a su rama de soporte. Esto corrige la vulnerabilidad de path traversal.

CVE सुरक्षा न्यूज़लेटर

भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।

अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…

What is CVE-2024-6789 — Path Traversal in M-Files Server?

CVE-2024-6789 is a vulnerability allowing authenticated users to read arbitrary files on M-Files Server versions before LTS 24.2.13421.15 SR2 and LTS 23.8.12892.0 SR6.

Am I affected by CVE-2024-6789 in M-Files Server?

You are affected if you are running M-Files Server versions 0–LTS 24.2.13421.15 SR2 or LTS 23.8.12892.0 SR6. Check your version against the fixed version.

How do I fix CVE-2024-6789 in M-Files Server?

Upgrade M-Files Server to LTS 24.2.13421.15 SR2 or a later version. Review release notes before upgrading.

Is CVE-2024-6789 being actively exploited?

There is currently no indication of active exploitation, but the vulnerability's nature suggests potential for exploitation.

Where can I find the official M-Files advisory for CVE-2024-6789?

Refer to the official M-Files security advisory for CVE-2024-6789 on the M-Files website.

क्या आपका प्रोजेक्ट प्रभावित है?

अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।