24 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-25533",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-08T17:15:07.620",
"lastModified": "2024-05-09T13:05:45.620",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Error messages in RuvarOA v6.01 and v12.01 were discovered to leak the physical path of the website (/WorkFlow/OfficeFileUpdate.aspx). This vulnerability can allow attackers to write files to the server or execute arbitrary commands via crafted SQL statements."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que los mensajes de error en RuvarOA v6.01 y v12.01 filtraban la ruta f\u00edsica del sitio web (/WorkFlow/OfficeFileUpdate.aspx). Esta vulnerabilidad puede permitir a los atacantes escribir archivos en el servidor o ejecutar comandos arbitrarios mediante declaraciones SQL manipuladas."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data",
"source": "cve@mitre.org"
}
]
}