The tbm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system.
History

Mon, 16 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Dec 2024 06:45:00 +0000

Type Values Removed Values Added
Description The tbm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system.
Title Chunghwa Telecom tbm-client - Arbitrary File Delete
Weaknesses CWE-352
CWE-36
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2024-12-16T06:37:33.766Z

Updated: 2024-12-16T16:43:23.320Z

Reserved: 2024-12-16T01:39:24.186Z

Link: CVE-2024-12643

cve-icon Vulnrichment

Updated: 2024-12-16T16:43:20.404Z

cve-icon NVD

Status : Received

Published: 2024-12-16T07:15:06.217

Modified: 2024-12-16T07:15:06.217

Link: CVE-2024-12643

cve-icon Redhat

No data.