CVE-2024-0191: CWE-538 File and Directory Information Exposure in RRJ Nueva Ecija Engineer Online Portal
A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/uploads/. The manipulation leads to file and directory information exposure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249504.
AI Analysis
Technical Summary
CVE-2024-0191 is a medium-severity vulnerability identified in version 1.0 of the RRJ Nueva Ecija Engineer Online Portal. The vulnerability is classified under CWE-538, which pertains to file and directory information exposure. Specifically, the flaw exists in an unspecified function related to the /admin/uploads/ directory of the portal. This vulnerability allows an unauthenticated remote attacker to access sensitive file and directory information that should otherwise be protected. The exposure of such information can aid attackers in mapping the server's file structure, identifying sensitive files, or gathering intelligence that could facilitate further attacks. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (remote), no privileges required, no user interaction needed, and limited impact confined to confidentiality (no integrity or availability impact). Although the exploit has been publicly disclosed, no known exploits are currently observed in the wild. No patches or fixes have been published yet, which means affected organizations must rely on mitigating controls until an official update is available.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on whether they use the RRJ Nueva Ecija Engineer Online Portal or similar software components. If deployed, the exposure of file and directory information could lead to reconnaissance by threat actors, potentially enabling more targeted attacks such as privilege escalation, data theft, or deployment of malware. While the vulnerability does not directly compromise data integrity or availability, the confidentiality breach can expose sensitive internal file structures or configuration files, which may contain credentials or other critical information. This is particularly concerning for engineering firms or public sector entities using this portal for project management or document handling, as it could lead to intellectual property exposure or disruption of engineering workflows. Additionally, the remote and unauthenticated nature of the exploit increases the risk profile, as attackers do not need prior access or user interaction to leverage the vulnerability.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting access to the /admin/uploads/ directory via web server configuration (e.g., using .htaccess rules or equivalent to deny directory listing and unauthorized access), implementing strict IP whitelisting or VPN access for administrative interfaces, and conducting thorough audits of exposed files to ensure no sensitive data is publicly accessible. Web application firewalls (WAFs) should be configured to detect and block suspicious requests targeting the vulnerable endpoint. Additionally, organizations should monitor web server logs for unusual access patterns to /admin/uploads/ and related directories. It is also advisable to engage with the vendor or software maintainer to obtain timelines for patches or updates. Finally, organizations should review their incident response plans to prepare for potential exploitation attempts and ensure backups of critical data are maintained securely.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0191: CWE-538 File and Directory Information Exposure in RRJ Nueva Ecija Engineer Online Portal
Description
A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/uploads/. The manipulation leads to file and directory information exposure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249504.
AI-Powered Analysis
Technical Analysis
CVE-2024-0191 is a medium-severity vulnerability identified in version 1.0 of the RRJ Nueva Ecija Engineer Online Portal. The vulnerability is classified under CWE-538, which pertains to file and directory information exposure. Specifically, the flaw exists in an unspecified function related to the /admin/uploads/ directory of the portal. This vulnerability allows an unauthenticated remote attacker to access sensitive file and directory information that should otherwise be protected. The exposure of such information can aid attackers in mapping the server's file structure, identifying sensitive files, or gathering intelligence that could facilitate further attacks. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (remote), no privileges required, no user interaction needed, and limited impact confined to confidentiality (no integrity or availability impact). Although the exploit has been publicly disclosed, no known exploits are currently observed in the wild. No patches or fixes have been published yet, which means affected organizations must rely on mitigating controls until an official update is available.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on whether they use the RRJ Nueva Ecija Engineer Online Portal or similar software components. If deployed, the exposure of file and directory information could lead to reconnaissance by threat actors, potentially enabling more targeted attacks such as privilege escalation, data theft, or deployment of malware. While the vulnerability does not directly compromise data integrity or availability, the confidentiality breach can expose sensitive internal file structures or configuration files, which may contain credentials or other critical information. This is particularly concerning for engineering firms or public sector entities using this portal for project management or document handling, as it could lead to intellectual property exposure or disruption of engineering workflows. Additionally, the remote and unauthenticated nature of the exploit increases the risk profile, as attackers do not need prior access or user interaction to leverage the vulnerability.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting access to the /admin/uploads/ directory via web server configuration (e.g., using .htaccess rules or equivalent to deny directory listing and unauthorized access), implementing strict IP whitelisting or VPN access for administrative interfaces, and conducting thorough audits of exposed files to ensure no sensitive data is publicly accessible. Web application firewalls (WAFs) should be configured to detect and block suspicious requests targeting the vulnerable endpoint. Additionally, organizations should monitor web server logs for unusual access patterns to /admin/uploads/ and related directories. It is also advisable to engage with the vendor or software maintainer to obtain timelines for patches or updates. Finally, organizations should review their incident response plans to prepare for potential exploitation attempts and ensure backups of critical data are maintained securely.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-02T10:22:47.963Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc1182aa0cae27ff336
Added to database: 6/3/2025, 2:59:13 PM
Last enriched: 7/4/2025, 5:26:45 AM
Last updated: 10/15/2025, 10:52:22 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9967: CWE-288 Authentication Bypass Using an Alternate Path or Channel in gsayed786 Orion SMS OTP Verification
CriticalCVE-2025-11728: CWE-306 Missing Authentication for Critical Function in oceanpayment Oceanpayment CreditCard Gateway
MediumCVE-2025-11722: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ikhodal Woocommerce Category and Products Accordion Panel
HighCVE-2025-11701: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumCVE-2025-11692: CWE-862 Missing Authorization in quicoto Zip Attachments
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.