A directory traversal issue was discovered in OpenSlides before 4.2.5. Files can be uploaded to OpenSlides meetings and organized in folders. The interface allows users to download a ZIP archive that contains all files in a folder and its subfolders. If an attacker specifies the title of a file or folder as a relative or absolute path (e.g., ../../../etc/passwd), the ZIP archive generated for download converts that title into a path. Depending on the extraction tool used by the user, this might overwrite files locally outside of the chosen directory.
References
Link | Resource |
---|---|
https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides | Exploit Third Party Advisory |
Configurations
History
27 Mar 2025, 14:00
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
First Time |
Openslides
Openslides openslides |
|
Summary |
|
|
CPE | cpe:2.3:a:openslides:openslides:*:*:*:*:*:*:*:* | |
References | () https://www.x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides - Exploit, Third Party Advisory |
21 Mar 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-21 06:15
Updated : 2025-03-27 14:00
NVD link : CVE-2025-30343
Mitre link : CVE-2025-30343
CVE.ORG link : CVE-2025-30343
JSON object : View
Products Affected
openslides
- openslides