Arbitrary File Download Vulnerability Discovered in Novel-Plus v4.3.0-RC1 and Prior
CVE-2024-24024

9.8CRITICAL

Key Information:

Vendor
Novel-Plus
Status
Novel-plus
Vendor
CVE Published:
8 February 2024

Summary

An arbitrary file download vulnerability has been identified in the Novel-Plus applications prior to version 4.3.0-RC1. This vulnerability occurs due to improper validation of input parameters within the fileDownload() method located in the FileController class. By crafting specific filePath and fileName parameters, an attacker may exploit this flaw to gain unauthorized access to files on the server, potentially compromising sensitive information. Organizations using affected versions of Novel-Plus should review their security measures and apply necessary patches or updates to mitigate this risk.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Collectors

NVD Database
.