The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Hawki
Hawki hawki |
|
CPEs | cpe:2.3:a:hawki:hawki:*:*:*:*:*:*:*:* | |
Vendors & Products |
Hawki
Hawki hawki |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-02-13T17:40:56.941Z
Reserved: 2024-02-13T09:28:28.809Z
Link: CVE-2024-25975

Updated: 2024-08-01T23:52:06.397Z

Status : Awaiting Analysis
Published: 2024-05-29T14:15:21.793
Modified: 2024-11-21T09:01:41.097
Link: CVE-2024-25975

No data.