Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CVE-2023-35081 | Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability is exploited through a path traversal flaw in Ivanti EPMM. Attackers initiate this vulnerability by leveraging authenticated administrative access to remotely write arbitrary files onto the server. This enables them to deploy additional payloads, potentially granting further access and compromising the system. This vulnerability is often used in conjunction with CVE-2023-35078 (along with others) that provides unauthenticated access, enhancing the attack's capabilities. It has been actively exploited, impacting victims by leveraging both vulnerabilities together.
References
|
CVE-2023-35081 | Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
This vulnerability is exploited through a path traversal flaw in Ivanti EPMM. Attackers initiate this vulnerability by leveraging authenticated administrative access to remotely write arbitrary files onto the server. This enables them to deploy additional payloads, potentially granting further access and compromising the system.
References
|
CVE-2023-32315 | Ignite Realtime Openfire Path Traversal Vulnerability | secondary_impact | T1087.002 | Domain Account |
Comments
CVE-2023-32315 is a path traversal bug in Openfire's administrative console that could be leveraged for remote code execution. Public reports have indicated that threat actors were exploiting this vulnerability to gain access to the Openfire plugins interface to create new admin console user accounts, install a malicious plugin, and gain access to a webshell.
References
|
CVE-2023-32315 | Ignite Realtime Openfire Path Traversal Vulnerability | exploitation_technique | T1202 | Indirect Command Execution |
Comments
CVE-2023-32315 is a path traversal bug in Openfire's administrative console that could be leveraged for remote code execution. Public reports have indicated that threat actors were exploiting this vulnerability to gain access to the Openfire plugins interface to create new admin console user accounts, install a malicious plugin, and gain access to a webshell.
References
|
CVE-2023-32315 | Ignite Realtime Openfire Path Traversal Vulnerability | secondary_impact | T1496 | Resource Hijacking |
Comments
CVE-2023-32315 is a path traversal bug in Openfire's administrative console that could be leveraged for remote code execution. Public reports have indicated that threat actors were exploiting this vulnerability to gain access to the Openfire plugins interface to create new admin console user accounts, install a malicious plugin, and gain access to a webshell.
References
|
CVE-2023-32315 | Ignite Realtime Openfire Path Traversal Vulnerability | primary_impact | T1505.003 | Web Shell |
Comments
CVE-2023-32315 is a path traversal bug in Openfire's administrative console that could be leveraged for remote code execution. Public reports have indicated that threat actors were exploiting this vulnerability to gain access to the Openfire plugins interface to create new admin console user accounts, install a malicious plugin, and gain access to a webshell.
References
|
CVE-2022-41328 | Fortinet FortiOS Path Traversal Vulnerability | secondary_impact | T1049 | System Network Connections Discovery |
Comments
CVE-2022-41328 is a path traversal vulnerability that allows a privileged attacked to read and write to files on the underlying Linux system via crafted CLI commands. Adversaries have been observed modifying files that establish persistence upon boot. The malicious files provide the adversaries with the capabilities of: data exfiltration, download/write files, remote shell, and discovery of network connections.
References
|
CVE-2022-41328 | Fortinet FortiOS Path Traversal Vulnerability | secondary_impact | T1565.001 | Stored Data Manipulation |
Comments
CVE-2022-41328 is a path traversal vulnerability that allows a privileged attacked to read and write to files on the underlying Linux system via crafted CLI commands. Adversaries have been observed modifying files that establish persistence upon boot. The malicious files provide the adversaries with the capabilities of: data exfiltration, download/write files, remote shell, and discovery of network connections.
References
|
CVE-2022-41328 | Fortinet FortiOS Path Traversal Vulnerability | primary_impact | T1037 | Boot or Logon Initialization Scripts |
Comments
CVE-2022-41328 is a path traversal vulnerability that allows a privileged attacked to read and write to files on the underlying Linux system via crafted CLI commands. Adversaries have been observed modifying files that establish persistence upon boot. The malicious files provide the adversaries with the capabilities of: data exfiltration, download/write files, remote shell, and discovery of network connections.
References
|
CVE-2022-41328 | Fortinet FortiOS Path Traversal Vulnerability | exploitation_technique | T1574 | Hijack Execution Flow |
Comments
CVE-2022-41328 is a path traversal vulnerability that allows a privileged attacked to read and write to files on the underlying Linux system via crafted CLI commands. Adversaries have been observed modifying files that establish persistence upon boot. The malicious files provide the adversaries with the capabilities of: data exfiltration, download/write files, remote shell, and discovery of network connections.
References
|
CVE-2021-42013 | Apache HTTP Server Path Traversal Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
CVE-2021-42013 was introduced as the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50. CVE-2021-42013 is a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows an attacker to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied," these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution.
References
|
CVE-2021-42013 | Apache HTTP Server Path Traversal Vulnerability | exploitation_technique | T1210 | Exploitation of Remote Services |
Comments
CVE-2021-42013 was introduced as the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50. CVE-2021-42013 is a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows an attacker to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied," these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution.
References
|
CVE-2021-41773 | Apache HTTP Server Path Traversal Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
CVE-2021-41773 is a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows an attacker to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied," these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution.
References
|
CVE-2021-41773 | Apache HTTP Server Path Traversal Vulnerability | exploitation_technique | T1210 | Exploitation of Remote Services |
Comments
CVE-2021-41773 is a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows an attacker to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied," these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution.
References
|
CVE-2020-3452 | Cisco ASA and FTD Read-Only Path Traversal Vulnerability | exploitation_technique | T1202 | Indirect Command Execution |
Comments
CVE-2020-3452 is a vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system.
References
|
CVE-2020-3452 | Cisco ASA and FTD Read-Only Path Traversal Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
CVE-2020-3452 is a vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system.
References
|
CVE-2019-3398 | Atlassian Confluence Server and Data Center Path Traversal Vulnerability | exploitation_technique | T1202 | Indirect Command Execution |
Comments
CVE-2019-3398 is a path traversal vulnerability in Atlassian Confluence Server and Data Center that allows an authenticated attacker to write files to arbitrary locations, potentially leading to remote code execution
References
|
CVE-2019-3398 | Atlassian Confluence Server and Data Center Path Traversal Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
CVE-2019-3398 is a path traversal vulnerability in Atlassian Confluence Server and Data Center that allows an authenticated attacker to write files to arbitrary locations, potentially leading to remote code execution
References
|
CVE-2018-13379 | Fortinet FortiOS SSL VPN Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This is a path traversal vulnerability that allows adversary to download system files through specially-crafted HTTP requests.
References
|
CVE-2013-0629 | Adobe ColdFusion Directory Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This is an exploitation of a public-facing server due to password misconfiguration. Exploitation allows attackers to access restricted directories.
References
|
CVE-2013-0629 | Adobe ColdFusion Directory Traversal Vulnerability | primary_impact | T1202 | Indirect Command Execution |
Comments
This is an exploitation of a public-facing server due to password misconfiguration. Exploitation allows attackers to access restricted directories
References
|
CVE-2013-0629 | Adobe ColdFusion Directory Traversal Vulnerability | secondary_impact | T1005 | Data from Local System |
Comments
This is an exploitation of a public-facing server due to password misconfiguration. Exploitation allows attackers to access restricted directories
References
|
CVE-2010-2861 | Adobe ColdFusion Directory Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This is the exploitation of a public facing server. In-the-wild reporting documents that exploitation of this vulnerability was used to install a webshell on the victim machine, and then captured and exfiltrated client credit card information.
References
|
CVE-2010-2861 | Adobe ColdFusion Directory Traversal Vulnerability | secondary_impact | T1119 | Automated Collection |
Comments
This is the exploitation of a public facing server. In-the-wild reporting documents that exploitation of this vulnerability was used to install a webshell on the victim machine, and then captured and exfiltrated client credit card information.
References
|
CVE-2010-2861 | Adobe ColdFusion Directory Traversal Vulnerability | primary_impact | T1105 | Ingress Tool Transfer |
Comments
This is the exploitation of a public facing server. In-the-wild reporting documents that exploitation of this vulnerability was used to install a webshell on the victim machine, and then captured and exfiltrated client credit card information.
References
|
CVE-2024-57727 | SimpleHelp Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
|
CVE-2024-57727 | SimpleHelp Path Traversal Vulnerability | primary_impact | T1552.001 | Credentials In Files |
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
|
CVE-2024-57727 | SimpleHelp Path Traversal Vulnerability | primary_impact | T1552.004 | Private Keys |
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
|
CVE-2024-57727 | SimpleHelp Path Traversal Vulnerability | primary_impact | T1003 | OS Credential Dumping |
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
|
CVE-2024-57727 | SimpleHelp Path Traversal Vulnerability | secondary_impact | T1059 | Command and Scripting Interpreter |
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
|
CVE-2024-55550 | Mitel MiCollab Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
Due to improper input sanitization, a user with administrative credentials can access and read arbitrary files on the MiCollab server.
References
|
CVE-2024-55550 | Mitel MiCollab Path Traversal Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
Due to improper input sanitization, a user with administrative credentials can access and read arbitrary files on the MiCollab server.
References
|
CVE-2024-55550 | Mitel MiCollab Path Traversal Vulnerability | secondary_impact | T1041 | Exfiltration Over C2 Channel |
Comments
Due to improper input sanitization, a user with administrative credentials can access and read arbitrary files on the MiCollab server. That data can then be exfiltrated.
References
|
CVE-2024-4885 | Progress WhatsUp Gold Path Traversal Vulnerability | exploitation_technique | T1068 | Exploitation for Privilege Escalation |
Comments
By sending a crafted payload to a vulnerable WhatsUp Gold server, an attacker can conduct a path traversal attack and write malicious files onto the server. This leads to high-privileged remote code execution.
References
|
CVE-2024-4885 | Progress WhatsUp Gold Path Traversal Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
By sending a crafted payload to a vulnerable WhatsUp Gold server, an attacker can conduct a path traversal attack and write malicious files onto the server. This leads to high-privileged remote code execution.
References
|
CVE-2024-48248 | NAKIVO Backup and Replication Absolute Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
An unauthenticated attacker can send a request to the NAKIVO Backup & Replication endpoint that contains a path to a sensitive file, leading to arbitrary file read.
References
|
CVE-2024-48248 | NAKIVO Backup and Replication Absolute Path Traversal Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
An unauthenticated attacker can send a request to the NAKIVO Backup & Replication endpoint that contains a path to a sensitive file, leading to arbitrary file read.
References
|
CVE-2024-48248 | NAKIVO Backup and Replication Absolute Path Traversal Vulnerability | secondary_impact | T1003 | OS Credential Dumping |
Comments
An unauthenticated attacker can send a request to the NAKIVO Backup & Replication endpoint that contains a path to a sensitive file, leading to arbitrary file read.
References
|
CVE-2024-41713 | Mitel MiCollab Path Traversal Vulnerability | exploitation_technique | T1068 | Exploitation for Privilege Escalation |
Comments
This path traversal vulnerability can lead to privilege escalation on MiCollab, which can then lead to other exploits such as CVE-2024-55550.
References
|
CVE-2024-41713 | Mitel MiCollab Path Traversal Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
This path traversal vulnerability can lead to privilege escalation on MiCollab, which can then lead to other exploits such as CVE-2024-55550.
References
|
CVE-2024-13161 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13161 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | exploitation_technique | T1558 | Steal or Forge Kerberos Tickets |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13161 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | primary_impact | T1550.002 | Pass the Hash |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13161 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | secondary_impact | T1087 | Account Discovery |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13160 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13160 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | exploitation_technique | T1558 | Steal or Forge Kerberos Tickets |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13160 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | primary_impact | T1550.002 | Pass the Hash |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13160 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | secondary_impact | T1087 | Account Discovery |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13159 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13159 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | exploitation_technique | T1558 | Steal or Forge Kerberos Tickets |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13159 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | primary_impact | T1550.002 | Pass the Hash |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-13159 | Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability | secondary_impact | T1087 | Account Discovery |
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
|
CVE-2024-0769 | D-Link DIR-859 Router Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This path traversal vulnerability in D-Link DIR-859 WiFi routers can lead to information disclosure, such as configuration files. As these devices are end-of-life, the manufacturer has no intention of patching this.
References
|
CVE-2024-0769 | D-Link DIR-859 Router Path Traversal Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
This path traversal vulnerability in D-Link DIR-859 WiFi routers can lead to information disclosure, such as configuration files. As these devices are end-of-life, the manufacturer has no intention of patching this.
References
|
CVE-2023-38950 | ZKTeco BioTime Path Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This directory traversal vulnerability, if exploited using a malicious payload in an HTTP GET request, allows an unauthenticated attacker to access and read arbitrary files, leading to potential exfiltration/disclosure.
References
|
CVE-2023-38950 | ZKTeco BioTime Path Traversal Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
This directory traversal vulnerability, if exploited using a malicious payload in an HTTP GET request, allows an unauthenticated attacker to access and read arbitrary files, leading to potential exfiltration/disclosure.
References
|
CVE-2017-12637 | SAP NetWeaver Directory Traversal Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
By exploiting this vulnerability in SAP Netweaver Java, the attacker can inject directory traversal commands, allowing for navigation of the file system beyond intended access. This can additionally lead to the discovery of password stores, as well as information about the host system, providing information that can be used in further attacks.
References
|
CVE-2017-12637 | SAP NetWeaver Directory Traversal Vulnerability | primary_impact | T1083 | File and Directory Discovery |
Comments
By exploiting this vulnerability in SAP Netweaver Java, the attacker can inject directory traversal commands, allowing for navigation of the file system beyond intended access. This can additionally lead to the discovery of password stores, as well as information about the host system, providing information that can be used in further attacks.
References
|
CVE-2017-12637 | SAP NetWeaver Directory Traversal Vulnerability | secondary_impact | T1592 | Gather Victim Host Information |
Comments
By exploiting this vulnerability in SAP Netweaver Java, the attacker can inject directory traversal commands, allowing for navigation of the file system beyond intended access. This can additionally lead to the discovery of password stores, as well as information about the host system, providing information that can be used in further attacks.
References
|
CVE-2017-12637 | SAP NetWeaver Directory Traversal Vulnerability | secondary_impact | T1555 | Credentials from Password Stores |
Comments
By exploiting this vulnerability in SAP Netweaver Java, the attacker can inject directory traversal commands, allowing for navigation of the file system beyond intended access. This can additionally lead to the discovery of password stores, as well as information about the host system, providing information that can be used in further attacks.
References
|
CVE-2025-4632 | Samsung MagicINFO 9 Server Path Traversal Vulnerability | exploitation_technique | T1068 | Exploitation for Privilege Escalation |
Comments
By exploiting a path traversal vulnerability in Samsung MagicINFO 9 Server, an unauthenticated attacker can write arbitrary files with system privileges. This can be used to deploy malware or to hijack resources for activity such as cryptocurrency mining.
References
|
CVE-2025-4632 | Samsung MagicINFO 9 Server Path Traversal Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
By exploiting a path traversal vulnerability in Samsung MagicINFO 9 Server, an unauthenticated attacker can write arbitrary files with system privileges. This can be used to deploy malware or to hijack resources for activity such as cryptocurrency mining.
References
|
CVE-2025-4632 | Samsung MagicINFO 9 Server Path Traversal Vulnerability | secondary_impact | T1496 | Resource Hijacking |
Comments
By exploiting a path traversal vulnerability in Samsung MagicINFO 9 Server, an unauthenticated attacker can write arbitrary files with system privileges. This can be used to deploy malware or to hijack resources for activity such as cryptocurrency mining.
References
|
CVE-2025-4632 | Samsung MagicINFO 9 Server Path Traversal Vulnerability | secondary_impact | T1608.001 | Upload Malware |
Comments
By exploiting a path traversal vulnerability in Samsung MagicINFO 9 Server, an unauthenticated attacker can write arbitrary files with system privileges. This can be used to deploy malware or to hijack resources for activity such as cryptocurrency mining.
References
|