The API used to interact with documents in the application contains a flaw that allows an authenticated attacker to read the contents of files on the underlying operating system. An account with ‘read’ and ‘download’ privileges on at least one existing document in the application is required to exploit the vulnerability. Exploitation of this vulnerability would allow an attacker to read the contents of any file available within the privileges of the system user running the application.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html |
![]() ![]() |
History
Tue, 18 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The API used to interact with documents in the application contains a flaw that allows an authenticated attacker to read the contents of files on the underlying operating system. An account with ‘read’ and ‘download’ privileges on at least one existing document in the application is required to exploit the vulnerability. Exploitation of this vulnerability would allow an attacker to read the contents of any file available within the privileges of the system user running the application. | |
Title | Arbitrary File Read via Document API | |
Weaknesses | CWE-23 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: BlackDuck
Published:
Updated: 2025-03-18T16:26:57.725Z
Reserved: 2024-12-02T14:24:50.889Z
Link: CVE-2024-12019

Updated: 2025-03-17T16:13:33.579Z

Status : Received
Published: 2025-03-14T18:15:27.230
Modified: 2025-03-14T18:15:27.230
Link: CVE-2024-12019

No data.