OrangeScrum 2.0.11 - Arbitrary File Delete via file_name
8,1
High
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
OrangeScrum 2.0.11 - Arbitrary File Delete via file_name
Code name
State
Public
Release date
30 ene 2023
Affected product
OrangeScrum
Affected version(s)
2.0.11
Vulnerability name
Lack of data validation - Path Traversal
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS v3.1 base score
8.1
Exploit available
No
CVE ID(s)
Description
OrangeScrum version 2.0.11 allows an authenticated external attacker to delete arbitrary local files from the server. This is possible because the application uses an unsanitized attacker-controlled parameter to construct an internal path.
Vulnerability
This vulnerability occurs because the application uses an unsanitized attacker-controlled parameter to construct an internal path.
Exploit
To exploit this vulnerability, we only need to send the following malicious malicious request to the server.
Evidence of exploitation




Our security policy
We have reserved the ID CVE-2023-0454 to refer to this issue from now on. Disclosure policy
System Information
Version: OrangeScrum 2.0.11
Operating System: GNU/Linux
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://github.com/Orangescrum/orangescrum/
Timeline
IA generativa
23 ene 2023
Vendor contacted
23 ene 2023
Vendor replied
23 ene 2023
Public disclosure
30 ene 2023