CRITICALCVE-2024-26261CVSS 9.8

Hgiga OAKlouds - Leitura e Exclusão Arbitrária de Arquivos

Plataforma

other

Componente

oaklouds

Corrigido em

188

1051

AI Confidence: highNVDEPSS 0.3%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2024-26261 describes a critical Arbitrary File Access vulnerability affecting OAKlouds versions up to 1051. This flaw allows attackers to download and delete files on the system without requiring authentication. The vulnerability stems from insufficient validation of file paths within specific request parameters, enabling unauthorized file manipulation. A patch is available in version 1051.

Impacto e Cenários de Ataquetraduzindo…

The impact of CVE-2024-26261 is severe. An attacker can exploit this vulnerability to download sensitive data stored on the OAKlouds server, including configuration files, user data, and potentially even system binaries. The ability to delete files introduces a further risk of data loss and denial of service. Successful exploitation could lead to complete compromise of the OAKlouds environment, allowing attackers to exfiltrate data, modify system configurations, or even gain remote code execution if the downloaded files contain malicious payloads. The lack of authentication required for exploitation significantly broadens the attack surface.

Contexto de Exploraçãotraduzindo…

CVE-2024-26261 was publicly disclosed on February 15, 2024. The vulnerability's simplicity and lack of authentication requirements suggest a moderate probability of exploitation (EPSS score likely medium). Public proof-of-concept exploits are likely to emerge given the ease of exploitation. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns targeting OAKlouds.

Quem Está em Riscotraduzindo…

Organizations utilizing OAKlouds for file storage and sharing, particularly those running versions prior to 1051, are at significant risk. Shared hosting environments where multiple users share the same OAKlouds instance are especially vulnerable, as an attacker compromising one user's account could potentially exploit this vulnerability to access files belonging to other users.

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

EPSS

0.25% (percentil 49%)

CISA SSVC

Exploraçãonone
Automatizávelyes
Impacto Técnicototal

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredNoneNível de autenticação necessárioUser InteractionNoneSe a vítima precisa tomar uma açãoScopeUnchangedImpacto além do componente afetadoConfidentialityHighRisco de exposição de dados sensíveisIntegrityHighRisco de modificação não autorizada de dadosAvailabilityHighRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Nenhum — sem autenticação necessária para explorar.
User Interaction
Nenhuma — ataque automático e silencioso. A vítima não faz nada.
Scope
Inalterado — impacto limitado ao componente vulnerável.
Confidentiality
Alto — perda total de confidencialidade. O atacante pode ler todos os dados.
Integrity
Alto — o atacante pode escrever, modificar ou excluir qualquer dado.
Availability
Alto — falha completa ou esgotamento de recursos. Negação de serviço total.

Software Afetado

Componenteoaklouds
FornecedorHgiga
Faixa afetadaCorrigido em
earlier – 188188
earlier – 10511051

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS atualizado

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation for CVE-2024-26261 is to immediately upgrade OAKlouds to version 1051 or later, which contains the fix. If upgrading is not immediately feasible, consider implementing temporary workarounds such as restricting access to the vulnerable endpoints through a Web Application Firewall (WAF) or proxy server. Configure the WAF to block requests containing suspicious file path parameters. Thoroughly review and validate all file path inputs within the affected modules to prevent unauthorized access. After upgrading, confirm the vulnerability is resolved by attempting to access a sensitive file via the vulnerable endpoint – access should be denied.

Como corrigir

Atualize o OAKlouds para a versão 188 ou superior. Esta atualização corrige a vulnerabilidade de leitura e exclusão arbitrária de arquivos. Consulte o site do fornecedor para obter instruções detalhadas sobre como realizar a atualização.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2024-26261 — Arbitrary File Access in OAKlouds?

CVE-2024-26261 is a critical vulnerability in OAKlouds versions ≤1051 allowing attackers to download and delete files without authentication through crafted request parameters.

Am I affected by CVE-2024-26261 in OAKlouds?

If you are using OAKlouds version 1051 or earlier, you are potentially affected by this vulnerability. Upgrade to version 1051 to mitigate the risk.

How do I fix CVE-2024-26261 in OAKlouds?

The recommended fix is to upgrade OAKlouds to version 1051 or later. As a temporary workaround, implement WAF rules to block suspicious file path parameters.

Is CVE-2024-26261 being actively exploited?

While no active exploitation has been confirmed, the vulnerability's simplicity suggests a moderate probability of exploitation. Monitor threat intelligence feeds for updates.

Where can I find the official OAKlouds advisory for CVE-2024-26261?

Refer to the official OAKlouds security advisory for detailed information and updates regarding CVE-2024-26261. Check the OAKlouds website or contact their support team.

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.