LuckyFrameWeb v3.5.2 was discovered to contain an arbitrary file deletion vulnerability via the fileName parameter in the fileDownload method.
References
Link | Resource |
---|---|
http://www.luckyframe.cn/ | Product |
https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35081.txt | Third Party Advisory |
http://www.luckyframe.cn/ | Product |
https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35081.txt | Third Party Advisory |
Configurations
History
18 Jun 2025, 16:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Luckyframe
Luckyframe luckyframeweb |
|
CPE | cpe:2.3:a:luckyframe:luckyframeweb:3.5.2:*:*:*:*:luckyframe:*:* | |
References | () http://www.luckyframe.cn/ - Product | |
References | () https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35081.txt - Third Party Advisory |
Information
Published : 2024-05-23 17:15
Updated : 2025-06-18 16:57
NVD link : CVE-2024-35081
Mitre link : CVE-2024-35081
CVE.ORG link : CVE-2024-35081
JSON object : View
Products Affected
luckyframe
- luckyframeweb
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')