Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52691 | A vulnerability has been identified in GoldPanKit eva-server v4.1.0. It affects the path parameter of the /api/resource/local/download endpoint, where manipulation of this parameter can lead to arbitrary file download. |
| Link | Providers |
|---|---|
| https://github.com/goldpankit/eva-springboot2/issues/2 |
|
Wed, 12 Feb 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 |
Wed, 12 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 11 Feb 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
cvssV3_1
|
Thu, 06 Feb 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in GoldPanKit eva-server v4.1.0. It affects the path parameter of the /api/resource/local/download endpoint, where manipulation of this parameter can lead to arbitrary file download. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-12T14:12:46.825Z
Reserved: 2024-12-06T00:00:00.000Z
Link: CVE-2024-54909
Updated: 2025-02-11T21:15:44.089Z
Status : Deferred
Published: 2025-02-06T22:15:38.250
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-54909
No data.
OpenCVE Enrichment
No data.
EUVD