CVE-2024-33881

An issue was discovered in VirtoSoftware Virto Bulk File Download 5.5.44 for SharePoint 2019. The Virto.SharePoint.FileDownloader/Api/Download.ashx isCompleted method allows an NTLMv2 hash leak via a UNC share pathname in the path parameter.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:virtosoftware:sharepoint_bulk_file_download:5.5.44:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*

History

15 Sep 2024, 20:35

Type Values Removed Values Added
CWE CWE-400 CWE-200

03 Jul 2024, 01:59

Type Values Removed Values Added
CWE CWE-400

26 Jun 2024, 14:42

Type Values Removed Values Added
First Time Virtosoftware
Microsoft
Microsoft sharepoint Server
Virtosoftware sharepoint Bulk File Download
CPE cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*
cpe:2.3:a:virtosoftware:sharepoint_bulk_file_download:5.5.44:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://docs.virtosoftware.com/v/virto-security-frequently-asked-questions-faq - () https://docs.virtosoftware.com/v/virto-security-frequently-asked-questions-faq - Product
References () https://download.virtosoftware.com/Manuals/nu_ncsc_virto_one_bulk_file_download_v5.4.4_pt_disclosure.pdf - () https://download.virtosoftware.com/Manuals/nu_ncsc_virto_one_bulk_file_download_v5.4.4_pt_disclosure.pdf - Product
Summary
  • (es) Se descubrió un problema en VirtoSoftware Virto Bulk File Download 5.5.44 para SharePoint 2019. El método Virto.SharePoint.FileDownloader/Api/Download.ashx isCompleted permite una fuga de hash NTLMv2 a través de un nombre de ruta compartido UNC en el parámetro de ruta.
CWE CWE-22

24 Jun 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-24 17:15

Updated : 2024-09-15 20:35


NVD link : CVE-2024-33881

Mitre link : CVE-2024-33881

CVE.ORG link : CVE-2024-33881


JSON object : View

Products Affected

virtosoftware

  • sharepoint_bulk_file_download

microsoft

  • sharepoint_server
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor