Path Traversal Vulnerability in Landray EKP Software
CVE-2024-11238

5.3MEDIUM

Key Information:

Vendor
Landray
Status
Ekp
Vendor
CVE Published:
15 November 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A significant vulnerability has been identified in Landray EKP, specifically in versions up to 16.0. The flaw exists in the 'delPreviewFile' function within the 'sysUiComponent.do' file, where improper handling of the 'directoryPath' argument can lead to path traversal. This allows attackers to access files in unauthorized directories, potentially exposing sensitive information. The vulnerability can be exploited remotely, making it particularly dangerous for users. Despite early notification to the vendor, no response was received, raising concerns about timely remediation. Organizations using affected versions should prioritize updating their systems and consider implementing additional security measures to mitigate the associated risks.

Affected Version(s)

EKP 16.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

CoinIsMoney (VulDB User)
.