CVE-2024-13042
Tsinghua Unigroup Electronic Archives Management System download.html download information disclosure
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file SubjectController.class.php. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Se ha encontrado una vulnerabilidad en Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). Se ha clasificado como problemática. La función de descarga del archivo SubjectController.class.php está afectada. La manipulación de la ruta de argumentos conduce a la divulgación de información. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.
A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file /Searchnew/Subject/download.html. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Es wurde eine problematische Schwachstelle in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532) ausgemacht. Dabei betrifft es die Funktion download der Datei /Searchnew/Subject/download.html. Durch Manipulation des Arguments path mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-12-30 CVE Reserved
- 2024-12-30 CVE Published
- 2024-12-31 EPSS Updated
- 2025-01-04 CVE Updated
- 2025-01-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-284: Improper Access Control
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/BxYQ/zg_fileread | Broken Link | |
https://vuldb.com/?id.289788 | Technical Description | |
https://vuldb.com/?submit.472068 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/BxYQ/zg_fileread/blob/main/poc.py | 2025-01-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tsinghua Unigroup Search vendor "Tsinghua Unigroup" | Electronic Archives Management System Search vendor "Tsinghua Unigroup" for product "Electronic Archives Management System" | 3.2.210802 Search vendor "Tsinghua Unigroup" for product "Electronic Archives Management System" and version "3.2.210802" | en |
Affected
|