Arbitrary File Download Vulnerability Discovered in Novel-Plus v4.3.0-RC1 and Prior
CVE-2024-24024
9.8CRITICAL
Key Information:
- Vendor
- Novel-Plus
- Status
- Novel-plus
- Vendor
- CVE Published:
- 8 February 2024
Summary
An arbitrary file download vulnerability has been identified in the Novel-Plus applications prior to version 4.3.0-RC1. This vulnerability occurs due to improper validation of input parameters within the fileDownload() method located in the FileController class. By crafting specific filePath and fileName parameters, an attacker may exploit this flaw to gain unauthorized access to files on the server, potentially compromising sensitive information. Organizations using affected versions of Novel-Plus should review their security measures and apply necessary patches or updates to mitigate this risk.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Collectors
NVD Database