First published: Thu Feb 08 2024(Updated: )
An arbitrary File download vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: fileDownload(). An attacker can pass in specially crafted filePath and fieName parameters to perform arbitrary File download.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xxyopen Novel | <=4.2.0 | |
xxyopen Novel | =4.3.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24024 has been classified as a medium to high severity vulnerability due to its potential for arbitrary file downloads.
To fix CVE-2024-24024, update your Novel-Plus application to version 4.3.0-RC2 or later.
CVE-2024-24024 affects Novel-Plus versions up to and including 4.3.0-RC1.
Yes, CVE-2024-24024 can lead to unauthorized access and data exposure due to its arbitrary file download capability.
CVE-2024-24024 is an arbitrary file download vulnerability that allows attackers to manipulate file path and name parameters.