VYPR
Unrated severityNVD Advisory· Published Oct 24, 2024· Updated Oct 25, 2024

ZimaOS vulnerable to Directory Listing via Parameter Manipulation

CVE-2024-49359

Description

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint http://<Zima_Server_IP:PORT>/v2_1/file in ZimaOS is vulnerable to a directory traversal attack, allowing authenticated users to list the contents of any directory on the server. By manipulating the path parameter, attackers can access sensitive system directories such as /etc, potentially exposing critical configuration files and increasing the risk of further attacks. As of time of publication, no known patched versions are available.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.