The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with administrator privileges to move arbitrary system files to the website root directory and access them.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-50213 The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with administrator privileges to move arbitrary system files to the website root directory and access them.
Fixes

Solution

Update to version v14.0.0 or later.


Workaround

No workaround given by the vendor.

History

Thu, 24 Oct 2024 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Teamplus
Teamplus team\+ Pro
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:teamplus:team\+_pro:*:*:*:*:private_cloud:android:*:*
Vendors & Products Teamplus
Teamplus team\+ Pro

Tue, 15 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 03:30:00 +0000

Type Values Removed Values Added
Description The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with administrator privileges to move arbitrary system files to the website root directory and access them.
Title TEAMPLUS TECHNOLOGY Team+ - Arbitrary File Move through Path Traversal
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-10-15T18:16:10.527Z

Reserved: 2024-10-14T02:10:16.720Z

Link: CVE-2024-9923

cve-icon Vulnrichment

Updated: 2024-10-15T18:15:43.480Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T04:15:06.070

Modified: 2024-10-24T13:24:23.430

Link: CVE-2024-9923

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.