Arbitrary File Read vulnerability in novel-plus 4.3.0 and before allows a remote attacker to obtain sensitive information via a crafted GET request using the filePath parameter.
References
| Link | Resource |
|---|---|
| https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ | Exploit Third Party Advisory |
| https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ | Exploit Third Party Advisory |
Configurations
History
10 Oct 2025, 18:23
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:xxyopen:novel-plus:*:*:*:*:*:*:*:* | |
| First Time |
Xxyopen
Xxyopen novel-plus |
|
| References | () https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ - Exploit, Third Party Advisory |
21 Nov 2024, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/ - |
03 Jul 2024, 01:57
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-639 |
30 Apr 2024, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-30 20:15
Updated : 2025-10-10 18:23
NVD link : CVE-2024-33383
Mitre link : CVE-2024-33383
CVE.ORG link : CVE-2024-33383
JSON object : View
Products Affected
xxyopen
- novel-plus
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
