CVE-2024-41922

A directory traversal vulnerability exists in the log files download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can result in a disclosure of arbitrary files. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2024-2061 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:veertu:anka_build_cloud:1.42.0:*:*:*:*:*:*:*

History

08 Oct 2024, 14:48

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2024-2061 - () https://talosintelligence.com/vulnerability_reports/TALOS-2024-2061 - Exploit, Third Party Advisory
First Time Veertu anka Build Cloud
Veertu
CPE cpe:2.3:a:veertu:anka_build_cloud:1.42.0:*:*:*:*:*:*:*

04 Oct 2024, 13:50

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de directory traversal en la funcionalidad de descarga de archivos de registro de Veertu Anka Build 1.42.0. Una solicitud HTTP especialmente manipulada puede dar como resultado la divulgación de archivos arbitrarios. Un atacante puede realizar una solicitud HTTP no autenticada para activar esta vulnerabilidad.

03 Oct 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-03 16:15

Updated : 2024-10-08 14:48


NVD link : CVE-2024-41922

Mitre link : CVE-2024-41922

CVE.ORG link : CVE-2024-41922


JSON object : View

Products Affected

veertu

  • anka_build_cloud
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')