The application implements an up- and downvote function which alters a value within a JSON file. The POST parameters are not filtered properly and therefore an arbitrary file can be overwritten. The file can be controlled by an authenticated attacker, the content cannot be controlled. It is possible to overwrite all files for which the webserver has write access. It is required to supply a relative path (path traversal).
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Hawki Hawki hawki | |
| CPEs | cpe:2.3:a:hawki:hawki:*:*:*:*:*:*:*:* | |
| Vendors & Products | Hawki Hawki hawki | |
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-05-29T13:13:14.625Z
Updated: 2025-02-13T17:40:56.941Z
Reserved: 2024-02-13T09:28:28.809Z
Link: CVE-2024-25975
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T23:52:06.397Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2024-05-29T14:15:21.793
Modified: 2024-11-21T09:01:41.097
Link: CVE-2024-25975
 Redhat
                        Redhat
                    No data.