CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-25975: Arbitrary File Overwrite

Description

The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).

Classification

CVE ID: CVE-2024-25975

Affected Products

Vendor: Interaction Design Team at the University of Applied Sciences and Arts in Hildesheim/Germany

Product: HAWKI

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 18.39% (scored less or equal to compared to others)

EPSS Date: 2025-03-14 (when was this score calculated)

References

https://r.sec-consult.com/hawki
https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1
http://seclists.org/fulldisclosure/2024/May/34

Timeline