Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-38353
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
CodiMD - Missing Image Access Controls and Unauthorized Image Access
Source: NVD (National Vulnerability Database)
Vulnerability Description
CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. This vulnerability is fixed in 2.5.4.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用具有密码学弱点缺陷的PRNG
Source: NVD (National Vulnerability Database)
Vulnerability Title
CodiMD 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CodiMD是HackMD开源的一个实时协作笔记应用程序。 CodiMD 2.5.3版本存在安全漏洞,该漏洞源于缺少身份验证和访问控制漏洞,允许未经身份验证的攻击者未经授权访问上传的图像数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
hackmdiocodimd < 2.5.4 -
II. Public POCs for CVE-2024-38353
#POC DescriptionSource LinkShenlong Link
1CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38353.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-38353
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-38353

No comments yet


Leave a comment