
CVE-2024-37728 Scanner
CVE-2024-37728 Scanner - Arbitrary File Read vulnerability in OfficeWeb365
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
18 days 9 hours
Scan only one
URL
Toolbox
OfficeWeb365 is a widely used online platform that allows users to access and manage their documents through a web interface. It is mainly used by businesses, educational institutions, and individuals who require online office applications. This platform provides functionalities such as text editing, data management, and presentation creation. Users appreciate its capabilities for team collaboration and document sharing, facilitating remote work and learning. It integrates seamlessly with various device platforms, enhancing accessibility and convenience for users globally.
The detected vulnerability in OfficeWeb365 is an Arbitrary File Read, which poses a significant risk. Arbitrary File Read vulnerabilities allow attackers to read files on the server without authorization. This can lead to the exposure of sensitive information or credentials stored on the server. The vulnerability could be exploited remotely without user authentication, making it accessible for attackers. Such vulnerabilities highlight weaknesses in access control and input validation mechanisms.
The technical details of the vulnerability involve the OfficeWeb365 Indexs interface. It allows remote attackers to send crafted GET requests to read files, using predictable file paths or filenames. The vulnerable endpoint is '/Pic/Indexs', and attackers manipulate the 'imgs' parameter to access unauthorized files. Successful exploitation relies on knowing or guessing valid filenames and paths on the server.
Exploitation of this vulnerability could lead to leakage of configuration files, user data, or other sensitive files. This could compromise user privacy, lead to identity theft, or enable further attacks on the network. In severe cases, sensitive system files could be read, exposing secrets that could escalate the attack to a more critical level. Organizations using OfficeWeb365 are at risk if this vulnerability is unpatched.
REFERENCES