Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)
A critical vulnerability has been discovered in vedees wcms versions up to 0.3.2. The vulnerability affects an unknown functionality in the file /wex/finder.php. By manipulating the argument 'p', an attacker can exploit a path traversal weakness. This vulnerability can be exploited remotely and does not require user interaction.
The impact of this vulnerability is severe. It allows remote attackers to potentially access and modify files outside of the intended directory structure. This can lead to unauthorized access to sensitive data, modification of critical files, and potentially compromise the entire system. The CVSS v3.1 base score is 9.1 (Critical), with high impacts on integrity and availability, but no impact on confidentiality. The attack vector is network-based, requires low complexity, and no privileges, making it relatively easy to exploit.
One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.
As of the latest information, no official patch has been released for this vulnerability. The vendor was contacted about this disclosure but did not respond. Given the critical nature of the vulnerability and the lack of vendor response, immediate attention and alternative mitigation strategies are crucial.
In the absence of an official patch, the following mitigation strategies are recommended: 1. Upgrade: If possible, upgrade vedees wcms to a version newer than 0.3.2, should one become available. 2. Access Control: Implement strict access controls to the /wex/finder.php file and surrounding directories. 3. Input Validation: Implement rigorous input validation and sanitization for the 'p' argument and any other user-supplied inputs. 4. Web Application Firewall (WAF): Deploy or configure a WAF to filter out potential path traversal attempts. 5. Least Privilege: Ensure the web server and application run with minimal necessary privileges. 6. Monitoring: Implement enhanced monitoring for any suspicious activities or access attempts related to this vulnerability. 7. Virtual Patching: Consider implementing virtual patching through intrusion prevention systems (IPS) or web application firewalls to block potential exploit attempts. Given the critical nature of this vulnerability (CVSS score 9.1) and the availability of a public exploit, addressing this issue should be considered a high priority for any systems running vedees wcms version 0.3.2 or earlier.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-8875. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-8875
A CVSS base score of 5.4 has been assigned.
EPSS Score was set to: 0.05% (Percentile: 16.3%)
A CVSS base score of 9.1 has been assigned.
A CVSS base score of 9.1 has been assigned.