Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
This vulnerability has been mitigated in LogicalDOC Community and Enterprise Editions version 9.1 by commit e7cd313.
Link | Providers |
---|---|
https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html |
![]() ![]() |
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 18 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The API used to interact with documents in the application contains a flaw that allows an authenticated attacker to read the contents of files on the underlying operating system. An account with ‘read’ and ‘download’ privileges on at least one existing document in the application is required to exploit the vulnerability. Exploitation of this vulnerability would allow an attacker to read the contents of any file available within the privileges of the system user running the application. | |
Title | Arbitrary File Read via Document API | |
Weaknesses | CWE-23 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: BlackDuck
Published:
Updated: 2025-03-18T16:26:57.725Z
Reserved: 2024-12-02T14:24:50.889Z
Link: CVE-2024-12019

Updated: 2025-03-17T16:13:33.579Z

Status : Received
Published: 2025-03-14T18:15:27.230
Modified: 2025-03-14T18:15:27.230
Link: CVE-2024-12019

No data.

Updated: 2025-07-15T08:04:27Z