### [CVE-2024-57170](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57170) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description SOPlanning 1.53.00 is vulnerable to a directory traversal issue in /process/upload.php. The "fichier_to_delete" parameter allows authenticated attackers to specify file paths containing directory traversal sequences (e.g., ../). This vulnerability enables attackers to delete arbitrary files outside the intended upload directory, potentially leading to denial of service or disruption of application functionality. ### POC #### Reference - https://themcsam.github.io/posts/so-planing-vulnerabilities/#arbitrary-file-deletion #### Github No PoCs found on GitHub currently.