First published: Fri Aug 02 2024(Updated: )
Digiwin EasyFlow .NET lacks proper access control for specific functionality, and the functionality do not adequately filter user input. A remote attacker with regular privilege can exploit this vulnerability to download arbitrary files from the remote server .
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Digiwin EasyFlow .NET | <6.6.17 |
For version V5.x and V6.1.x, please install the patch (released on 2024/05/20). For version V6.6.x, please update to version V6.6.17 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7323 has been rated as a critical vulnerability due to its potential to allow unauthorized file downloads.
To fix CVE-2024-7323, update Digiwin EasyFlow .NET to version 6.6.17 or later, which includes the necessary access control enhancements.
A remote attacker with regular privileges can exploit CVE-2024-7323 to gain access to sensitive files on the server.
Digiwin EasyFlow .NET versions prior to 6.6.17 are affected by CVE-2024-7323.
Exploitation of CVE-2024-7323 can lead to unauthorized access and potential disclosure of sensitive information from the server.