IDURAR is open source ERP CRM accounting invoicing software. The vulnerability exists in the corePublicRouter.js file. Using the reference usage here, it is identified that the public endpoint is accessible to an unauthenticated user. The user's input is directly appended to the join statement without additional checks. This allows an attacker to send URL encoded malicious payload. The directory structure can be escaped to read system files by adding an encoded string (payload) at subpath location.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Idurarapp
Idurarapp idurar |
|
CPEs | cpe:2.3:a:idurarapp:idurar:*:*:*:*:*:*:*:* | |
Vendors & Products |
Idurarapp
Idurarapp idurar |
Fri, 04 Oct 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Idurar Project
Idurar Project idurar |
|
CPEs | cpe:2.3:a:idurar_project:idurar:-:*:*:*:*:*:*:* | |
Vendors & Products |
Idurar Project
Idurar Project idurar |
|
Metrics |
ssvc
|
Fri, 04 Oct 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IDURAR is open source ERP CRM accounting invoicing software. The vulnerability exists in the corePublicRouter.js file. Using the reference usage here, it is identified that the public endpoint is accessible to an unauthenticated user. The user's input is directly appended to the join statement without additional checks. This allows an attacker to send URL encoded malicious payload. The directory structure can be escaped to read system files by adding an encoded string (payload) at subpath location. | |
Title | IDURAR has a Path Traversal (unauthenticated user can read sensitive data) | |
Weaknesses | CWE-22 CWE-23 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-04T14:45:41.123Z
Updated: 2024-10-04T16:00:38.245Z
Reserved: 2024-09-30T21:28:53.232Z
Link: CVE-2024-47769
Vulnrichment
Updated: 2024-10-04T16:00:27.351Z
NVD
Status : Analyzed
Published: 2024-10-04T15:15:13.427
Modified: 2024-11-13T15:12:54.033
Link: CVE-2024-47769
Redhat
No data.