CVE-2024-6746
NaiboWang EasySpider HTTP GET Request server.js path traversal
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue "because the default is that the software runs locally without going through the Internet".
Una vulnerabilidad fue encontrada en NaiboWang EasySpider 0.6.2 en Windows y clasificada como problemática. Una función desconocida del archivo \EasySpider\resources\app\server.js del componente HTTP GET Request Handler es afectada por esta vulnerabilidad. La manipulación con la entrada /../../../../../../../../../Windows/win.ini conduce al path traversal: '../filedir'. El ataque debe realizarse dentro de la red local. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-271477. NOTA: El encargado del código explica que esto no es un gran problema "porque el valor predeterminado es que el software se ejecuta localmente sin pasar por Internet".
In NaiboWang EasySpider 0.6.2 für Windows wurde eine problematische Schwachstelle entdeckt. Betroffen ist eine unbekannte Verarbeitung der Datei \EasySpider\resources\app\server.js der Komponente HTTP GET Request Handler. Durch Manipulieren mit der Eingabe /../../../../../../../../../Windows/win.ini mit unbekannten Daten kann eine path traversal: '../filedir'-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-07-15 CVE Reserved
- 2024-07-15 CVE Published
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- 2024-11-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-24: Path Traversal: '../filedir'
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.271477 | Technical Description | |
https://vuldb.com/?submit.371998 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/NaiboWang/EasySpider/issues/466 | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Easyspider Search vendor "Easyspider" | Easyspider Search vendor "Easyspider" for product "Easyspider" | 0.6.2 Search vendor "Easyspider" for product "Easyspider" and version "0.6.2" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|