Medium

chuanhuchatgpt

File Overwrite Vulnerability Leading to Configuration Tampering and DoS Risk

A file overwrite vulnerability in versions <=20240410 allows attackers to tamper with configuration files, leading to unauthorized changes and potential denial of service (DoS). The issue was patched in a subsequent release.

Available publicly on Jun 14 2024

6.5

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Credit:

qhaoduoyu
Threat Overview

The vulnerability allows an attacker to overwrite critical configuration files by exploiting specific functions within the system. By doing so, the attacker can alter system behavior or security settings, potentially leading to unauthorized access or a denial of service (DoS) condition. The vulnerability is particularly severe if the system relies heavily on these configuration files for its operation.

Attack Scenario

An attacker sends crafted requests to the vulnerable system, targeting functions with fn_index 36 to overwrite configuration files. After modifying the files, the attacker triggers a system restart using fn_index 66, causing the system to operate with the tampered configurations, potentially leading to a denial of service (DoS) or other malicious outcomes.

Who is affected

Users and administrators of the affected software version (<=20240410) are at risk. This includes any system relying on the vulnerable configuration files for its operation.

Technical Report
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.