The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).
History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Hawki
Hawki hawki
CPEs cpe:2.3:a:hawki:hawki:*:*:*:*:*:*:*:*
Vendors & Products Hawki
Hawki hawki
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-02-13T17:40:56.941Z

Reserved: 2024-02-13T09:28:28.809Z

Link: CVE-2024-25975

cve-icon Vulnrichment

Updated: 2024-08-01T23:52:06.397Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-29T14:15:21.793

Modified: 2024-11-21T09:01:41.097

Link: CVE-2024-25975

cve-icon Redhat

No data.