{"uuid": "0b6bf925-2d19-47d5-8eed-684ee208496a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24830", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12918", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-24830\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: OpenClinica is an open source software for Electronic Data Capture (EDC) and Clinical Data Management (CDM). OpenClinica prior to version 3.16 is vulnerable to path traversal in multiple endpoints, leading to arbitrary file read/write, and potential remote code execution. There are no known workarounds. This issue has been patched and users are recommended to upgrade.\n\ud83d\udccf Published: 2022-05-13T23:40:09.000Z\n\ud83d\udccf Modified: 2025-04-22T18:01:35.975Z\n\ud83d\udd17 References:\n1. https://github.com/OpenClinica/OpenClinica/security/advisories/GHSA-9rrv-prff-qph7\n2. https://github.com/OpenClinica/OpenClinica/commit/6f864e86543f903bd20d6f9fc7056115106441f3", "creation_timestamp": "2025-04-22T18:03:29.000000Z"}