IDURAR is open source ERP CRM accounting invoicing software. The vulnerability exists in the corePublicRouter.js file. Using the reference usage here, it is identified that the public endpoint is accessible to an unauthenticated user. The user's input is directly appended to the join statement without additional checks. This allows an attacker to send URL encoded malicious payload. The directory structure can be escaped to read system files by adding an encoded string (payload) at subpath location.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Idurarapp
Idurarapp idurar |
|
CPEs | cpe:2.3:a:idurarapp:idurar:*:*:*:*:*:*:*:* | |
Vendors & Products |
Idurarapp
Idurarapp idurar |
Fri, 04 Oct 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Idurar Project
Idurar Project idurar |
|
CPEs | cpe:2.3:a:idurar_project:idurar:-:*:*:*:*:*:*:* | |
Vendors & Products |
Idurar Project
Idurar Project idurar |
|
Metrics |
ssvc
|
Fri, 04 Oct 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IDURAR is open source ERP CRM accounting invoicing software. The vulnerability exists in the corePublicRouter.js file. Using the reference usage here, it is identified that the public endpoint is accessible to an unauthenticated user. The user's input is directly appended to the join statement without additional checks. This allows an attacker to send URL encoded malicious payload. The directory structure can be escaped to read system files by adding an encoded string (payload) at subpath location. | |
Title | IDURAR has a Path Traversal (unauthenticated user can read sensitive data) | |
Weaknesses | CWE-22 CWE-23 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-04T16:00:38.245Z
Reserved: 2024-09-30T21:28:53.232Z
Link: CVE-2024-47769

Updated: 2024-10-04T16:00:27.351Z

Status : Analyzed
Published: 2024-10-04T15:15:13.427
Modified: 2024-11-13T15:12:54.033
Link: CVE-2024-47769

No data.