CVE-2024-25975

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-25975
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-25975.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-25975
Published
2024-05-29T14:15:21Z
Modified
2025-01-15T05:09:35.773968Z
Summary
[none]
Details

The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).

References

Affected packages

Git / github.com/hawk-digital-environments/hawki

Affected ranges

Type
GIT
Repo
https://github.com/hawk-digital-environments/hawki
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0.0-beta.1