The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
Fixes

Solution

Update to version v14.0.0 or later.


Workaround

No workaround given by the vendor.

History

Thu, 24 Oct 2024 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Teamplus team\+ Pro
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:teamplus:team\+_pro:*:*:*:*:private_cloud:android:*:*
Vendors & Products Teamplus team\+ Pro

Tue, 15 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Teamplus
Teamplus team\+
CPEs cpe:2.3:a:teamplus:team\+:*:*:*:*:*:*:*:*
Vendors & Products Teamplus
Teamplus team\+
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 03:15:00 +0000

Type Values Removed Values Added
Description The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
Title TEAMPLUS TECHNOLOGY Team+ - Arbitrary File Read through Path Traversal
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-10-15T18:20:33.844Z

Reserved: 2024-10-14T02:10:15.245Z

Link: CVE-2024-9922

cve-icon Vulnrichment

Updated: 2024-10-15T18:20:26.988Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T03:15:10.683

Modified: 2024-10-24T13:21:53.853

Link: CVE-2024-9922

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.