The functionality for file download in HGiga OAKlouds' certain modules contains an Arbitrary File Read and Delete vulnerability. Attackers can put file path in specific request parameters, allowing them to download the file without login. Furthermore, the file will be deleted after being downloaded.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Hgiga
Hgiga oaklouds-organization-2.0 Hgiga oaklouds-organization-3.0 Hgiga oaklouds-webbase-2.0 Hgiga oaklouds-webbase-3.0 |
|
CPEs | cpe:2.3:a:hgiga:oaklouds-organization-2.0:*:*:*:*:*:*:*:* cpe:2.3:a:hgiga:oaklouds-organization-3.0:*:*:*:*:*:*:*:* cpe:2.3:a:hgiga:oaklouds-webbase-2.0:*:*:*:*:*:*:*:* cpe:2.3:a:hgiga:oaklouds-webbase-3.0:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Hgiga
Hgiga oaklouds-organization-2.0 Hgiga oaklouds-organization-3.0 Hgiga oaklouds-webbase-2.0 Hgiga oaklouds-webbase-3.0 |

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-08-02T00:07:19.038Z
Reserved: 2024-02-15T01:33:48.679Z
Link: CVE-2024-26261

Updated: 2024-08-02T00:07:19.038Z

Status : Analyzed
Published: 2024-02-15T03:15:35.083
Modified: 2025-01-23T19:56:10.270
Link: CVE-2024-26261

No data.