A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927.
A backup file is stored in a directory or archive that is made accessible to unauthorized actors.
The product makes files or directories accessible to unauthorized actors, even though they should not be.
Link | Tags |
---|---|
https://vuldb.com/?id.240927 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.240927 | signature third party advisory permissions required |
https://github.com/magicwave18/vuldb/issues/2 | issue tracking exploit |