Vulnerability Description
QiAnXin TianQing Management Center versions up to and including 6.7.0.4130 contain a path traversal vulnerability in the rptsvr component that allows unauthenticated attackers to upload files to arbitrary locations on the server. The /rptsvr/upload endpoint fails to sanitize the filename parameter in multipart form-data requests, enabling path traversal. This allows attackers to place executable files in web-accessible directories, potentially leading to remote code execution. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-08-23 UTC.
Related Weaknesses (CWE)
References
- https://blog.csdn.net/maxiluo/article/details/135865584
- https://cn-sec.com/archives/2421288.html
- https://www.qianxin.com/product/detail/pid/330
- https://www.vulncheck.com/advisories/qianxin-tianqing-management-center-arbitrar
FAQ
What is CVE-2024-13984?
CVE-2024-13984 is a documented vulnerability. QiAnXin TianQing Management Center versions up to and including 6.7.0.4130 contain a path traversal vulnerability in the rptsvr component that allows unauthenticated attackers to upload files to arbit...
How severe is CVE-2024-13984?
CVSS scoring is not yet available for CVE-2024-13984. Check NVD for updates.
Is there a patch for CVE-2024-13984?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.