{"id":"CVE-2019-10767","details":"An attacker can include file contents from outside the `/adapter/xxx/` directory, where `xxx` is the name of an existent adapter like \"admin\". It is exploited using the administrative web panel with a request for an adapter file. **Note:** The attacker has to be logged in if the authentication is enabled (by default isn't enabled).","aliases":["GHSA-cmch-296j-wfvw"],"modified":"2026-04-10T04:13:33.665199Z","published":"2019-11-21T17:15:11.350Z","related":["SNYK-JS-IOBROKERJSCONTROLLER-534881"],"references":[{"type":"FIX","url":"https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/iobroker/iobroker.js-controller","events":[{"introduced":"0"},{"fixed":"eb6f3bdee0c2573dd994790c48a4597196b24297"},{"fixed":"f6e292c6750a491a5000d0f851b2fede4f9e2fda"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.0.25"}]}}],"versions":["0.11.0","0.11.2","0.11.3","0.13.1","0.13.2","0.15.1","0.17.2","0.6.3","0.6.4","0.7.1","0.7.10","0.7.5","0.7.7","0.8.10","0.9.0","1.0.0","1.2.1","1.2.3","1.2.5","1.2.6","1.3.0","1.4.0","1.4.1","1.4.2","1.5.0","1.5.11","1.5.4","1.5.4-fixes","1.5.5","1.5.6","1.5.7","1.5.8","V0.3.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10767.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}