The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).
Fixes

Solution

The vendor provides a patch which can be downloaded from https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1


Workaround

No workaround given by the vendor.

History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Hawki
Hawki hawki
CPEs cpe:2.3:a:hawki:hawki:*:*:*:*:*:*:*:*
Vendors & Products Hawki
Hawki hawki
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-02-13T17:40:56.941Z

Reserved: 2024-02-13T09:28:28.809Z

Link: CVE-2024-25975

cve-icon Vulnrichment

Updated: 2024-08-01T23:52:06.397Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-29T14:15:21.793

Modified: 2024-11-21T09:01:41.097

Link: CVE-2024-25975

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.