Use of a Broken or Risky Cryptographic Algorithm
CVE-2024-40465
Summary
An issue in beego versions prior to 2.2.1, allows a remote attacker to escalate privileges via the "getCacheFileName" function in "file.go" file.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- LOW
- HIGH
- HIGH
CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
References
Advisory Timeline
- Published