The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2024-05-29T13:13:14.625Z

Updated: 2024-08-01T23:52:06.397Z

Reserved: 2024-02-13T09:28:28.809Z

Link: CVE-2024-25975

cve-icon Vulnrichment

Updated: 2024-08-01T23:52:06.397Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-29T14:15:21.793

Modified: 2024-07-03T01:49:20.510

Link: CVE-2024-25975

cve-icon Redhat

No data.