Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-31450
HistoryApr 19, 2024 - 6:59 p.m.

CVE-2024-31450 Owncast vulnerable to arbitrary file deletion in emoji.go (GHSL-2023-277)

2024-04-1918:59:19
CWE-22
GitHub_M
github.com
2
owncast
api
arbitrary file deletion

CVSS3

2.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

AI Score

6.7

Confidence

Low

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Owncast is an open source, self-hosted, decentralized, single user live video streaming and chat server. The Owncast application exposes an administrator API at the URL /api/admin. The emoji/delete endpoint of said API allows administrators to delete custom emojis, which are saved on disk. The parameter name is taken from the JSON request and directly appended to the filepath that points to the emoji to delete. By using path traversal sequences (…/), attackers with administrative privileges can exploit this endpoint to delete arbitrary files on the system, outside of the emoji directory. This vulnerability is fixed in 0.1.3.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:owncast_project:owncast:*:*:*:*:*:*:*:*"
    ],
    "vendor": "owncast_project",
    "product": "owncast",
    "versions": [
      {
        "status": "affected",
        "version": "*0.1.3"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

2.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

AI Score

6.7

Confidence

Low

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-31450