The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-05-29T13:13:14.625Z
Updated: 2024-08-01T23:52:06.397Z
Reserved: 2024-02-13T09:28:28.809Z
Link: CVE-2024-25975
Vulnrichment
Updated: 2024-08-01T23:52:06.397Z
NVD
Status : Awaiting Analysis
Published: 2024-05-29T14:15:21.793
Modified: 2024-07-03T01:49:20.510
Link: CVE-2024-25975
Redhat
No data.