Description
A vulnerability was found in CoCoTeaNet CyreneAdmin up to 1.3.0. This affects an unknown part of the file /api/system/user/getAvatar of the component Image Handler. Performing a manipulation of the argument Avatar results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used.
Problem types
Product status
1.1
1.2
1.3.0
Timeline
| 2026-02-18: | Advisory disclosed |
| 2026-02-18: | VulDB entry created |
| 2026-02-21: | VulDB entry last update |
Credits
sageee (VulDB User)
References
vuldb.com/?id.346492 (VDB-346492 | CoCoTeaNet CyreneAdmin Image getAvatar path traversal)
vuldb.com/?ctiid.346492 (VDB-346492 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.754241 (Submit #754241 | CoCoTeaNet CyreneAdmin ≤1.3.0 Directory Traversal)