{"id":"CVE-2023-47467","details":"Directory Traversal vulnerability in jeecg-boot v.3.6.0 allows a remote privileged attacker to obtain sensitive information via the file directory structure.","aliases":["GHSA-rgg9-264h-3hfw"],"modified":"2026-04-11T12:46:15.069116Z","published":"2023-11-22T18:15:08.980Z","database_specific":{},"references":[{"type":"WEB","url":"https://www.yuque.com/u2479829/tegvu8/dvmfdl5fssfen05q"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jeecgboot/JeecgBoot","events":[{"introduced":"0"},{"last_affected":"04c55fa3bab5d834510b9aade68e5da1b452f6f8"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"3.6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:jeecg:jeecg_boot:3.6.0:*:*:*:*:*:*:*"}}],"versions":["2.2.0","2.3.0","2.4.0","2.4.1","2.4.5","v2.0.2","v2.1.0","v2.1.1","v2.1.3","v2.1.4","v2.2.1","v2.3","v2.3.0","v2.4.1","v2.4.2","v2.4.3","v2.4.5","v2.4.6","v3.0","v3.0.0","v3.1.0","v3.2.0","v3.4.0","v3.4.2","v3.4.3","v3.4.3last","v3.4.4","v3.4.4last","v3.5.0","v3.5.1","v3.5.1last","v3.5.3","v3.5.5","v3.5.5last","v3.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-47467.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}