{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-11238","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-11-15T07:11:20.720Z","datePublished":"2024-11-15T12:31:04.496Z","dateUpdated":"2024-11-15T20:23:10.217Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-11-15T12:31:04.496Z"},"title":"Landray EKP sysUiComponent.do delPreviewFile path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"Landray","product":"EKP","versions":[{"version":"16.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in Landray EKP up to 16.0. This affects the function delPreviewFile of the file /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. The manipulation of the argument directoryPath leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in Landray EKP bis 16.0 gefunden. Dabei betrifft es die Funktion delPreviewFile der Datei /sys/ui/sys_ui_component/sysUiComponent.do?method=delPreviewFile. Durch Manipulation des Arguments directoryPath mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.4,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P"}}],"timeline":[{"time":"2024-11-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-11-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-11-15T08:16:30.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"CoinIsMoney (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.284673","name":"VDB-284673 | Landray EKP sysUiComponent.do delPreviewFile path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.284673","name":"VDB-284673 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.438291","name":"Submit #438291 | Shenzhen Landray Software Co.,LTD. EKP <= v16.0 Directory traversal","tags":["third-party-advisory"]},{"url":"https://github.com/CoinIsMoney/TempGuide/blob/main/LL-exp-02.pdf","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"landray","product":"landray_ekp","cpes":["cpe:2.3:a:landray:landray_ekp:16.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"16.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-15T20:22:35.488152Z","id":"CVE-2024-11238","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-15T20:23:10.217Z"}}]}}