CVE-2024-6746

A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue "because the default is that the software runs locally without going through the Internet".
References
Link Resource
https://github.com/NaiboWang/EasySpider/issues/466 Exploit Issue Tracking
https://vuldb.com/?ctiid.271477 Permissions Required
https://vuldb.com/?id.271477 Third Party Advisory VDB Entry
https://vuldb.com/?submit.371998 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

19 Jul 2024, 18:02

Type Values Removed Values Added
References () https://github.com/NaiboWang/EasySpider/issues/466 - () https://github.com/NaiboWang/EasySpider/issues/466 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.271477 - () https://vuldb.com/?ctiid.271477 - Permissions Required
References () https://vuldb.com/?id.271477 - () https://vuldb.com/?id.271477 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.371998 - () https://vuldb.com/?submit.371998 - Third Party Advisory, VDB Entry
Summary
  • (es) Una vulnerabilidad fue encontrada en NaiboWang EasySpider 0.6.2 en Windows y clasificada como problemática. Una función desconocida del archivo \EasySpider\resources\app\server.js del componente HTTP GET Request Handler es afectada por esta vulnerabilidad. La manipulación con la entrada /../../../../../../../../../Windows/win.ini conduce al path traversal: '../filedir'. El ataque debe realizarse dentro de la red local. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-271477. NOTA: El encargado del código explica que esto no es un gran problema "porque el valor predeterminado es que el software se ejecuta localmente sin pasar por Internet".
CWE CWE-22
CVSS v2 : 3.3
v3 : 4.3
v2 : 3.3
v3 : 8.8
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*
First Time Easyspider easyspider
Easyspider
Microsoft
Microsoft windows

15 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-15 12:15

Updated : 2024-07-19 18:02


NVD link : CVE-2024-6746

Mitre link : CVE-2024-6746

CVE.ORG link : CVE-2024-6746


JSON object : View

Products Affected

microsoft

  • windows

easyspider

  • easyspider
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-24

Path Traversal: '../filedir'