First published: Fri May 03 2024(Updated: )
LG Simple Editor putCanvasDB Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the putCanvasDB method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM. . Was ZDI-CAN-20010.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
LG Simple Editor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40508 has been classified as a critical severity vulnerability due to its potential for arbitrary file deletion.
To mitigate CVE-2023-40508, update LG Simple Editor to the latest version provided by the vendor.
CVE-2023-40508 affects all installations of LG Simple Editor, as authentication is not required for exploitation.
Remote attackers can leverage CVE-2023-40508 to perform directory traversal attacks resulting in arbitrary file deletion.
No, CVE-2023-40508 can be exploited without any authentication, making it particularly dangerous.