A vulnerability was found in qwdigital LinkWechat 5.1.0. It has been classified as problematic. This affects an unknown part of the file /linkwechat-api/common/download/resource of the component Universal Download Interface. The manipulation of the argument name with the input /profile/../../../../../etc/passwd leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252033 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/biantaibao/LinkWechat-Scrm_arbitrary-file-download-vulnerability/blob/main/report.md | Exploit |
https://vuldb.com/?ctiid.252033 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.252033 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-01-25 19:15
Updated : 2024-05-17 02:35
NVD link : CVE-2024-0882
Mitre link : CVE-2024-0882
CVE.ORG link : CVE-2024-0882
JSON object : View
Products Affected
linkwechat
- linkwechat