Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33118: n/a

0
High
VulnerabilityCVE-2024-33118cvecve-2024-33118
Published: Mon May 06 2024 (05/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

LuckyFrameWeb v3.5.2 was discovered to contain an arbitrary read vulnerability via the fileDownload method in class com.luckyframe.project.common.CommonController.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:43:19 UTC

Technical Analysis

CVE-2024-33118 identifies an arbitrary file read vulnerability in LuckyFrameWeb version 3.5.2, located in the fileDownload method of the class com.luckyframe.project.common.CommonController. This vulnerability allows remote attackers to read arbitrary files from the server without any authentication or user interaction, due to insufficient validation of file paths or parameters passed to the fileDownload method. The vulnerability falls under CWE-494, which involves downloading or reading files without proper validation, potentially exposing sensitive system or application files. The CVSS 3.1 base score of 7.5 indicates a high-severity issue with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). This means an attacker can remotely and easily exploit this flaw to access sensitive information such as configuration files, credentials, or other critical data stored on the server. No patches or fixes have been released at the time of publication, and no active exploitation has been reported. The vulnerability's presence in a web application framework used for project management or enterprise applications increases the risk of sensitive data leakage.

Potential Impact

The primary impact of CVE-2024-33118 is the unauthorized disclosure of sensitive information stored on affected servers. Attackers exploiting this vulnerability can read arbitrary files, potentially gaining access to configuration files, database credentials, private keys, or other confidential data. This breach of confidentiality can lead to further attacks such as privilege escalation, lateral movement, or targeted data exfiltration. Since the vulnerability does not affect integrity or availability, the system's operation remains intact, but the confidentiality breach alone can have severe consequences, including regulatory non-compliance, reputational damage, and financial loss. Organizations relying on LuckyFrameWeb for critical business functions are at risk of data exposure, especially if sensitive files are accessible via the vulnerable endpoint. The lack of authentication and user interaction requirements makes this vulnerability easier to exploit remotely, increasing the threat landscape. Although no known exploits are currently active, the public disclosure may prompt attackers to develop exploit code, raising the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2024-33118, organizations should immediately restrict access to the fileDownload endpoint by implementing network-level controls such as IP whitelisting or VPN access to limit exposure. Input validation must be enforced rigorously on the fileDownload method parameters to prevent path traversal or arbitrary file access, including sanitizing and validating file names and paths against a whitelist of allowed files or directories. If possible, disable or remove the fileDownload functionality until a vendor patch is available. Monitor web server and application logs for unusual file access patterns or repeated requests targeting the vulnerable endpoint. Employ web application firewalls (WAFs) with custom rules to detect and block exploitation attempts. Regularly audit and review file permissions on the server to minimize sensitive file exposure. Stay informed about vendor updates or patches and apply them promptly once released. Additionally, conduct internal penetration testing to verify the vulnerability's presence and the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c39b7ef31ef0b561544

Added to database: 2/25/2026, 9:40:09 PM

Last enriched: 2/28/2026, 2:43:19 AM

Last updated: 4/12/2026, 3:38:08 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses