ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zimaspace
Zimaspace zimaos |
|
CPEs | cpe:2.3:a:zimaspace:zimaos:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zimaspace
Zimaspace zimaos |
Fri, 25 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Icewhaletech
Icewhaletech zimaos |
|
CPEs | cpe:2.3:o:icewhaletech:zimaos:*:*:*:*:*:*:*:* | |
Vendors & Products |
Icewhaletech
Icewhaletech zimaos |
|
Metrics |
ssvc
|
Thu, 24 Oct 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available. | |
Title | ZimaOS Arbitrary File Read via Parameter Manipulation | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-24T20:49:44.077Z
Updated: 2024-10-25T17:33:10.960Z
Reserved: 2024-10-09T22:06:46.175Z
Link: CVE-2024-48931
Vulnrichment
Updated: 2024-10-25T17:33:06.453Z
NVD
Status : Analyzed
Published: 2024-10-24T21:15:14.580
Modified: 2024-11-06T15:46:23.067
Link: CVE-2024-48931
Redhat
No data.