PandaXGO PandaX up to 20240310 upload.go DeleteImage fileName path traversal
A vulnerability has been found in PandaXGO PandaX up to 20240310 and classified as critical. This vulnerability affects the function DeleteImage
of the file /apps/system/router/upload.go. The manipulation of the argument fileName with the input ../../../../../../../../../tmp/1.txt
leads to path traversal: '../filedir'. Using CWE to declare the problem leads to CWE-24. The weakness was disclosed 03/16/2024. The advisory is available at github.com.
This vulnerability was named CVE-2024-2563. The attack can be initiated remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1006 by the MITRE ATT&CK project.
It is declared as proof-of-concept. It is possible to download the exploit at github.com. As 0-day the estimated underground price was around $0-$5k.
The bugfix is ready for download at github.com. A possible mitigation has been published before and not just after the disclosure of the vulnerability.