The topm-client from Chunghwa Telecom has an Arbitrary File Read vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains a Relative Path Traversal vulnerability, allowing attackers to read arbitrary files on the user's system.
History

Mon, 16 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Dec 2024 07:00:00 +0000

Type Values Removed Values Added
Description The topm-client from Chunghwa Telecom has an Arbitrary File Read vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains a Relative Path Traversal vulnerability, allowing attackers to read arbitrary files on the user's system.
Title Chunghwa Telecom topm-client - Arbitrary File Read
Weaknesses CWE-23
CWE-352
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2024-12-16T06:49:30.828Z

Updated: 2024-12-16T16:42:18.516Z

Reserved: 2024-12-16T01:39:26.813Z

Link: CVE-2024-12645

cve-icon Vulnrichment

Updated: 2024-12-16T16:42:10.720Z

cve-icon NVD

Status : Received

Published: 2024-12-16T07:15:06.560

Modified: 2024-12-16T07:15:06.560

Link: CVE-2024-12645

cve-icon Redhat

No data.