{"vulnerability": "cve-2024-47769", "sightings": [{"uuid": "c52520e8-ce8a-4085-b5ab-6342e9a8a609", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47769", "type": "seen", "source": "https://t.me/cvedetector/6992", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47769 - IDURAR LFI/VBS Directory Traversal\", \n  \"Content\": \"CVE ID : CVE-2024-47769 \nPublished : Oct. 4, 2024, 3:15 p.m. | 18\u00a0minutes ago \nDescription : IDURAR is open source ERP CRM accounting invoicing software. The vulnerability exists in the corePublicRouter.js file. Using the reference usage here, it is identified that the public endpoint is accessible to an unauthenticated user. The user's input is directly appended to the join statement without additional checks. This allows an attacker to send URL encoded malicious payload. The directory structure can be escaped to read system files by adding an encoded string (payload) at subpath location. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T17:42:43.000000Z"}]}