Skip to main content

CVE-2024-0849: CWE-73: External Control of File Name or Path in Leanote Leanote

Medium
VulnerabilityCVE-2024-0849cvecve-2024-0849cwe-73
Published: Wed Feb 07 2024 (02/07/2024, 02:50:42 UTC)
Source: CVE
Vendor/Project: Leanote
Product: Leanote

Description

Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible because the application is vulnerable to LFR.

AI-Powered Analysis

AILast updated: 07/04/2025, 13:56:07 UTC

Technical Analysis

CVE-2024-0849 is a medium-severity vulnerability affecting Leanote version 2.7.0, categorized under CWE-73: External Control of File Name or Path. This vulnerability allows an attacker with limited privileges (requires local access and some user interaction) to perform Local File Read (LFR) attacks, enabling them to obtain arbitrary local files from the system where Leanote is installed. The vulnerability arises because the application improperly handles user-supplied input that controls file names or paths, allowing traversal or manipulation to access files outside the intended directories. The CVSS 3.1 base score is 5.0, reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), privileges (PR:L), and user interaction (UI:R). The impact is high on confidentiality (C:H) but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on February 7, 2024, and has been enriched by CISA, indicating recognition by cybersecurity authorities. The flaw could be exploited by an attacker who has some level of access to the system, such as a legitimate user or someone who has gained limited foothold, to read sensitive files, potentially leaking credentials, configuration files, or other sensitive data stored locally by Leanote or on the host system.

Potential Impact

For European organizations using Leanote 2.7.0, this vulnerability poses a significant confidentiality risk. Since Leanote is a note-taking and collaboration platform, it may store sensitive corporate information, intellectual property, or personal data. An attacker exploiting this flaw could access confidential files, leading to data breaches, intellectual property theft, or exposure of personal data subject to GDPR regulations. The local attack vector means that the attacker must have some access to the system, which could be achieved through compromised user accounts or insider threats. This elevates the risk in environments where endpoint security is weak or where multiple users share access to the same systems. The lack of impact on integrity and availability limits the threat to data exposure rather than system disruption. However, the confidentiality breach alone can have severe regulatory and reputational consequences for European entities, especially those in regulated sectors such as finance, healthcare, or government.

Mitigation Recommendations

European organizations should prioritize upgrading Leanote from version 2.7.0 to a patched version once available. In the absence of an official patch, organizations should implement strict access controls to limit local user privileges, ensuring that only trusted users have access to systems running Leanote. Employ application sandboxing or containerization to restrict Leanote's file system access to only necessary directories. Monitor and audit file access logs for unusual activity indicative of exploitation attempts. Employ endpoint detection and response (EDR) solutions to detect suspicious local file access patterns. Additionally, educate users about the risks of social engineering or phishing that could lead to local access compromise. Network segmentation can also reduce the risk by isolating systems running Leanote from broader enterprise networks. Finally, consider deploying host-based intrusion prevention systems (HIPS) that can block unauthorized file access attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2024-01-24T02:36:01.693Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb57f

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 1:56:07 PM

Last updated: 8/14/2025, 12:08:07 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats