Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-6746

Опубликовано: 15 июл. 2024
Источник: nvd
CVSS3: 4.3
CVSS3: 8.8
CVSS2: 3.3
EPSS Высокий

Описание

A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue "because the default is that the software runs locally without going through the Internet".

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.82258
Высокий

4.3 Medium

CVSS3

8.8 High

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-24
CWE-22

Связанные уязвимости

CVSS3: 4.3
github
больше 1 года назад

A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue "because the default is that the software runs locally without going through the Internet".

EPSS

Процентиль: 99%
0.82258
Высокий

4.3 Medium

CVSS3

8.8 High

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-24
CWE-22