The API used to interact with documents in the application contains a flaw that allows an authenticated attacker to read the contents of files on the underlying operating system. An account with ‘read’ and ‘download’ privileges on at least one existing document in the application is required to exploit the vulnerability. Exploitation of this vulnerability would allow an attacker to read the contents of any file available within the privileges of the system user running the application.
History

Tue, 18 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Description The API used to interact with documents in the application contains a flaw that allows an authenticated attacker to read the contents of files on the underlying operating system. An account with ‘read’ and ‘download’ privileges on at least one existing document in the application is required to exploit the vulnerability. Exploitation of this vulnerability would allow an attacker to read the contents of any file available within the privileges of the system user running the application.
Title Arbitrary File Read via Document API
Weaknesses CWE-23
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: BlackDuck

Published:

Updated: 2025-03-18T16:26:57.725Z

Reserved: 2024-12-02T14:24:50.889Z

Link: CVE-2024-12019

cve-icon Vulnrichment

Updated: 2025-03-17T16:13:33.579Z

cve-icon NVD

Status : Received

Published: 2025-03-14T18:15:27.230

Modified: 2025-03-14T18:15:27.230

Link: CVE-2024-12019

cve-icon Redhat

No data.