Vulnerability CVE-2024-25975


Published: 2024-05-29

Description:
The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).

See advisories in our WLB2 database:
Topic
Author
Date
Med.
HAWKI 1.0.0-beta.1 XSS / File Overwrite / Session Fixation
Thorger Jansen
29.05.2024

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

 References:
https://r.sec-consult.com/hawki
https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1

Copyright 2024, cxsecurity.com

 

Back to Top