FKIE_CVE-2026-2753
Vulnerability from fkie_nvd - Published: 2026-03-06 15:16 - Updated: 2026-03-10 18:18
Severity ?
Summary
An Absolute Path Traversal vulnerability exists in Navtor NavBox. The application exposes an HTTP service that fails to properly sanitize user-supplied path input. Unauthenticated remote attackers can exploit this issue by submitting requests containing absolute filesystem paths. Successful exploitation allows the attacker to retrieve arbitrary files from the underlying filesystem, limited only by the privileges of the service process. This can lead to the exposure of sensitive configuration files and system information.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Absolute Path Traversal vulnerability exists in Navtor NavBox. The application exposes an HTTP service that fails to properly sanitize user-supplied path input. Unauthenticated remote attackers can exploit this issue by submitting requests containing absolute filesystem paths. Successful exploitation allows the attacker to retrieve arbitrary files from the underlying filesystem, limited only by the privileges of the service process. This can lead to the exposure of sensitive configuration files and system information."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de salto de ruta absoluto en Navtor NavBox. La aplicaci\u00f3n expone un servicio HTTP que no logra sanear correctamente la entrada de ruta proporcionada por el usuario. Atacantes remotos no autenticados pueden explotar este problema al enviar solicitudes que contienen rutas absolutas del sistema de archivos. La explotaci\u00f3n exitosa permite al atacante recuperar archivos arbitrarios del sistema de archivos subyacente, limitado \u00fanicamente por los privilegios del proceso del servicio. Esto puede llevar a la exposici\u00f3n de archivos de configuraci\u00f3n sensibles e informaci\u00f3n del sistema."
}
],
"id": "CVE-2026-2753",
"lastModified": "2026-03-10T18:18:49.827",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "56a186b1-7f5e-4314-ba38-38d5499fccfd",
"type": "Secondary"
}
]
},
"published": "2026-03-06T15:16:11.157",
"references": [
{
"source": "56a186b1-7f5e-4314-ba38-38d5499fccfd",
"url": "https://cydome.io/vulnerability-advisory-cve-2026-2753-in-navtor-navbox-version-4-12-0-3"
},
{
"source": "56a186b1-7f5e-4314-ba38-38d5499fccfd",
"url": "https://www.navtor.com/navtor-vendor-statement"
}
],
"sourceIdentifier": "56a186b1-7f5e-4314-ba38-38d5499fccfd",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-36"
}
],
"source": "56a186b1-7f5e-4314-ba38-38d5499fccfd",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…