Description
The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
Published: 2024-10-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Update to version v14.0.0 or later.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-50212 The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
History

Thu, 24 Oct 2024 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Teamplus team\+ Pro
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:teamplus:team\+_pro:*:*:*:*:private_cloud:android:*:*
Vendors & Products Teamplus team\+ Pro

Tue, 15 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Teamplus
Teamplus team\+
CPEs cpe:2.3:a:teamplus:team\+:*:*:*:*:*:*:*:*
Vendors & Products Teamplus
Teamplus team\+
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 03:15:00 +0000

Type Values Removed Values Added
Description The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
Title TEAMPLUS TECHNOLOGY Team+ - Arbitrary File Read through Path Traversal
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Teamplus Team\+ Team\+ Pro
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-10-15T18:20:33.844Z

Reserved: 2024-10-14T02:10:15.245Z

Link: CVE-2024-9922

cve-icon Vulnrichment

Updated: 2024-10-15T18:20:26.988Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T03:15:10.683

Modified: 2024-10-24T13:21:53.853

Link: CVE-2024-9922

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses