{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-8163","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-08-26T07:22:14.393Z","datePublished":"2024-08-26T13:00:11.158Z","dateUpdated":"2025-11-24T06:20:40.634Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-11-24T06:20:40.634Z"},"title":"Chengdu Everbrite Network Technology BeikeShop files destroyFiles path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"Chengdu Everbrite Network Technology","product":"BeikeShop","versions":[{"version":"1.5.0","status":"affected"},{"version":"1.5.1","status":"affected"},{"version":"1.5.2","status":"affected"},{"version":"1.5.3","status":"affected"},{"version":"1.5.4","status":"affected"},{"version":"1.5.5","status":"affected"},{"version":"1.6.0","status":"unaffected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 1.6.0 can resolve this issue. You should upgrade the affected component."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.5,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2024-08-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-08-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-11-24T07:25:26.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"wanglun (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.275761","name":"VDB-275761 | Chengdu Everbrite Network Technology BeikeShop files destroyFiles path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.275761","name":"VDB-275761 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.393374","name":"Submit #393374 | Chengdu Guangda Network Technology BeikeShop <=v1.5.5 Arbitrary File Deletion","tags":["third-party-advisory"]},{"url":"https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"chengdu_everbrite_network_technology","product":"beike_shop","cpes":["cpe:2.3:a:chengdu_everbrite_network_technology:beike_shop:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.5.0","status":"affected"},{"version":"1.5.1","status":"affected"},{"version":"1.5.2","status":"affected"},{"version":"1.5.3","status":"affected"},{"version":"1.5.4","status":"affected"},{"version":"1.5.5","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-26T14:59:27.343838Z","id":"CVE-2024-8163","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-26T15:03:51.037Z"}}]}}