Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-22263 |
CWE-ID | CWE-22 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Spring Cloud Data Flow Web applications / Other software |
Vendor | Pivotal |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU89866
Risk: Medium
CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2024-22263
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: Yes
DescriptionThe vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing file upload requests within the Skipper server API. A remote user can use a crafted upload request to write arbitrary file to any location on file system, resulting in full system compromise.
Install update from vendor's website.
Vulnerable software versionsSpring Cloud Data Flow: 2.10.0 - 2.11.2
CPE2.3https://spring.io/security/cve-2024-22263
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.