Skip to main content

CVE-2024-0191: CWE-538 File and Directory Information Exposure in RRJ Nueva Ecija Engineer Online Portal

Medium
VulnerabilityCVE-2024-0191cvecve-2024-0191cwe-538
Published: Tue Jan 02 2024 (01/02/2024, 19:31:03 UTC)
Source: CVE Database V5
Vendor/Project: RRJ
Product: Nueva Ecija Engineer Online Portal

Description

A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/uploads/. The manipulation leads to file and directory information exposure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249504.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:26:45 UTC

Technical Analysis

CVE-2024-0191 is a medium-severity vulnerability identified in version 1.0 of the RRJ Nueva Ecija Engineer Online Portal. The vulnerability is classified under CWE-538, which pertains to file and directory information exposure. Specifically, the flaw exists in an unspecified function related to the /admin/uploads/ directory of the portal. This vulnerability allows an unauthenticated remote attacker to access sensitive file and directory information that should otherwise be protected. The exposure of such information can aid attackers in mapping the server's file structure, identifying sensitive files, or gathering intelligence that could facilitate further attacks. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (remote), no privileges required, no user interaction needed, and limited impact confined to confidentiality (no integrity or availability impact). Although the exploit has been publicly disclosed, no known exploits are currently observed in the wild. No patches or fixes have been published yet, which means affected organizations must rely on mitigating controls until an official update is available.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether they use the RRJ Nueva Ecija Engineer Online Portal or similar software components. If deployed, the exposure of file and directory information could lead to reconnaissance by threat actors, potentially enabling more targeted attacks such as privilege escalation, data theft, or deployment of malware. While the vulnerability does not directly compromise data integrity or availability, the confidentiality breach can expose sensitive internal file structures or configuration files, which may contain credentials or other critical information. This is particularly concerning for engineering firms or public sector entities using this portal for project management or document handling, as it could lead to intellectual property exposure or disruption of engineering workflows. Additionally, the remote and unauthenticated nature of the exploit increases the risk profile, as attackers do not need prior access or user interaction to leverage the vulnerability.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting access to the /admin/uploads/ directory via web server configuration (e.g., using .htaccess rules or equivalent to deny directory listing and unauthorized access), implementing strict IP whitelisting or VPN access for administrative interfaces, and conducting thorough audits of exposed files to ensure no sensitive data is publicly accessible. Web application firewalls (WAFs) should be configured to detect and block suspicious requests targeting the vulnerable endpoint. Additionally, organizations should monitor web server logs for unusual access patterns to /admin/uploads/ and related directories. It is also advisable to engage with the vendor or software maintainer to obtain timelines for patches or updates. Finally, organizations should review their incident response plans to prepare for potential exploitation attempts and ensure backups of critical data are maintained securely.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-02T10:22:47.963Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff336

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 5:26:45 AM

Last updated: 8/12/2025, 9:48:49 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats