Unauthenticated File Read and Delete, and Write Operations via Directory Traversal in Totemmail 7.x and 8.x Before 8.3.0
CVE-2024-28064
9.8CRITICAL
What is CVE-2024-28064?
A directory traversal vulnerability exists in Kiteworks Totemomail versions 7.x and 8.x prior to 8.3.0. This flaw allows unauthorized users to perform messageId directory traversal, leading to unprivileged file read and deletion capabilities through the /responsiveUI/EnvelopeOpenServlet endpoint. Additionally, it permits write operations via the storeLoginChunkedImages feature. Exploiting this vulnerability can result in unauthorized access to sensitive files, posing significant risks to the confidentiality and integrity of the server's data.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
