{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T04:13:57.411","vulnerabilities":[{"cve":{"id":"CVE-2020-24925","sourceIdentifier":"cve@mitre.org","published":"2020-09-15T13:15:12.610","lastModified":"2024-11-21T05:16:13.300","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Sensitive Source Code Path Disclosure vulnerability is found in ElkarBackup v1.3.3. An attacker is able to view the path of the source code jobs/sort where entire source code path is displayed in the browser itself helping the attacker identify the code structure /app/elkarbackup/src/Binovo/ElkarBackupBundle/Controller/DefaultController.php"},{"lang":"es","value":"Se encuentra una vulnerabilidad de Divulgación de Ruta de Código Fuente Confidencial en ElkarBackup versión v1.3.3.&#xa0;Un atacante puede visualizar la ruta de los trabajos de código fuente y ordenar donde una ruta completa del código fuente es mostrada en el propio navegador, ayudando al atacante a identificar la estructura de código de /app/elkarbackup/src/Binovo/ElkarBackupBundle/Controller/DefaultController.php"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:N/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-209"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elkarbackup:elkarbackup:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"33822C20-221B-45FF-8560-EA04969FFEA1"}]}]}],"references":[{"url":"https://vyshnavvizz.blogspot.com/2020/09/sensitive-information-disclosure-source.html","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.elkarbackup.org/","source":"cve@mitre.org","tags":["Product"]},{"url":"https://vyshnavvizz.blogspot.com/2020/09/sensitive-information-disclosure-source.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.elkarbackup.org/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}