CVE-2024-1433 (GCVE-0-2024-1433)
Vulnerability from cvelistv5
Published
2024-02-11 23:00
Modified
2025-04-24 15:44
CWE
Summary
A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user's home or the installation of third party global themes.
Impacted products
Vendor Product Version
KDE Plasma Workspace Version: 5.0
Version: 5.1
Version: 5.2
Version: 5.3
Version: 5.4
Version: 5.5
Version: 5.6
Version: 5.7
Version: 5.8
Version: 5.9
Version: 5.10
Version: 5.11
Version: 5.12
Version: 5.13
Version: 5.14
Version: 5.15
Version: 5.16
Version: 5.17
Version: 5.18
Version: 5.19
Version: 5.20
Version: 5.21
Version: 5.22
Version: 5.23
Version: 5.24
Version: 5.25
Version: 5.26
Version: 5.27
Version: 5.28
Version: 5.29
Version: 5.30
Version: 5.31
Version: 5.32
Version: 5.33
Version: 5.34
Version: 5.35
Version: 5.36
Version: 5.37
Version: 5.38
Version: 5.39
Version: 5.40
Version: 5.41
Version: 5.42
Version: 5.43
Version: 5.44
Version: 5.45
Version: 5.46
Version: 5.47
Version: 5.48
Version: 5.49
Version: 5.50
Version: 5.51
Version: 5.52
Version: 5.53
Version: 5.54
Version: 5.55
Version: 5.56
Version: 5.57
Version: 5.58
Version: 5.59
Version: 5.60
Version: 5.61
Version: 5.62
Version: 5.63
Version: 5.64
Version: 5.65
Version: 5.66
Version: 5.67
Version: 5.68
Version: 5.69
Version: 5.70
Version: 5.71
Version: 5.72
Version: 5.73
Version: 5.74
Version: 5.75
Version: 5.76
Version: 5.77
Version: 5.78
Version: 5.79
Version: 5.80
Version: 5.81
Version: 5.82
Version: 5.83
Version: 5.84
Version: 5.85
Version: 5.86
Version: 5.87
Version: 5.88
Version: 5.89
Version: 5.90
Version: 5.91
Version: 5.92
Version: 5.93
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-1433",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-13T15:38:55.464865Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-24T15:44:57.998Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:40:21.050Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.253407"
          },
          {
            "tags": [
              "signature",
              "permissions-required",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?ctiid.253407"
          },
          {
            "tags": [
              "patch",
              "x_transferred"
            ],
            "url": "https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Theme File Handler"
          ],
          "product": "Plasma Workspace",
          "vendor": "KDE",
          "versions": [
            {
              "status": "affected",
              "version": "5.0"
            },
            {
              "status": "affected",
              "version": "5.1"
            },
            {
              "status": "affected",
              "version": "5.2"
            },
            {
              "status": "affected",
              "version": "5.3"
            },
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "status": "affected",
              "version": "5.5"
            },
            {
              "status": "affected",
              "version": "5.6"
            },
            {
              "status": "affected",
              "version": "5.7"
            },
            {
              "status": "affected",
              "version": "5.8"
            },
            {
              "status": "affected",
              "version": "5.9"
            },
            {
              "status": "affected",
              "version": "5.10"
            },
            {
              "status": "affected",
              "version": "5.11"
            },
            {
              "status": "affected",
              "version": "5.12"
            },
            {
              "status": "affected",
              "version": "5.13"
            },
            {
              "status": "affected",
              "version": "5.14"
            },
            {
              "status": "affected",
              "version": "5.15"
            },
            {
              "status": "affected",
              "version": "5.16"
            },
            {
              "status": "affected",
              "version": "5.17"
            },
            {
              "status": "affected",
              "version": "5.18"
            },
            {
              "status": "affected",
              "version": "5.19"
            },
            {
              "status": "affected",
              "version": "5.20"
            },
            {
              "status": "affected",
              "version": "5.21"
            },
            {
              "status": "affected",
              "version": "5.22"
            },
            {
              "status": "affected",
              "version": "5.23"
            },
            {
              "status": "affected",
              "version": "5.24"
            },
            {
              "status": "affected",
              "version": "5.25"
            },
            {
              "status": "affected",
              "version": "5.26"
            },
            {
              "status": "affected",
              "version": "5.27"
            },
            {
              "status": "affected",
              "version": "5.28"
            },
            {
              "status": "affected",
              "version": "5.29"
            },
            {
              "status": "affected",
              "version": "5.30"
            },
            {
              "status": "affected",
              "version": "5.31"
            },
            {
              "status": "affected",
              "version": "5.32"
            },
            {
              "status": "affected",
              "version": "5.33"
            },
            {
              "status": "affected",
              "version": "5.34"
            },
            {
              "status": "affected",
              "version": "5.35"
            },
            {
              "status": "affected",
              "version": "5.36"
            },
            {
              "status": "affected",
              "version": "5.37"
            },
            {
              "status": "affected",
              "version": "5.38"
            },
            {
              "status": "affected",
              "version": "5.39"
            },
            {
              "status": "affected",
              "version": "5.40"
            },
            {
              "status": "affected",
              "version": "5.41"
            },
            {
              "status": "affected",
              "version": "5.42"
            },
            {
              "status": "affected",
              "version": "5.43"
            },
            {
              "status": "affected",
              "version": "5.44"
            },
            {
              "status": "affected",
              "version": "5.45"
            },
            {
              "status": "affected",
              "version": "5.46"
            },
            {
              "status": "affected",
              "version": "5.47"
            },
            {
              "status": "affected",
              "version": "5.48"
            },
            {
              "status": "affected",
              "version": "5.49"
            },
            {
              "status": "affected",
              "version": "5.50"
            },
            {
              "status": "affected",
              "version": "5.51"
            },
            {
              "status": "affected",
              "version": "5.52"
            },
            {
              "status": "affected",
              "version": "5.53"
            },
            {
              "status": "affected",
              "version": "5.54"
            },
            {
              "status": "affected",
              "version": "5.55"
            },
            {
              "status": "affected",
              "version": "5.56"
            },
            {
              "status": "affected",
              "version": "5.57"
            },
            {
              "status": "affected",
              "version": "5.58"
            },
            {
              "status": "affected",
              "version": "5.59"
            },
            {
              "status": "affected",
              "version": "5.60"
            },
            {
              "status": "affected",
              "version": "5.61"
            },
            {
              "status": "affected",
              "version": "5.62"
            },
            {
              "status": "affected",
              "version": "5.63"
            },
            {
              "status": "affected",
              "version": "5.64"
            },
            {
              "status": "affected",
              "version": "5.65"
            },
            {
              "status": "affected",
              "version": "5.66"
            },
            {
              "status": "affected",
              "version": "5.67"
            },
            {
              "status": "affected",
              "version": "5.68"
            },
            {
              "status": "affected",
              "version": "5.69"
            },
            {
              "status": "affected",
              "version": "5.70"
            },
            {
              "status": "affected",
              "version": "5.71"
            },
            {
              "status": "affected",
              "version": "5.72"
            },
            {
              "status": "affected",
              "version": "5.73"
            },
            {
              "status": "affected",
              "version": "5.74"
            },
            {
              "status": "affected",
              "version": "5.75"
            },
            {
              "status": "affected",
              "version": "5.76"
            },
            {
              "status": "affected",
              "version": "5.77"
            },
            {
              "status": "affected",
              "version": "5.78"
            },
            {
              "status": "affected",
              "version": "5.79"
            },
            {
              "status": "affected",
              "version": "5.80"
            },
            {
              "status": "affected",
              "version": "5.81"
            },
            {
              "status": "affected",
              "version": "5.82"
            },
            {
              "status": "affected",
              "version": "5.83"
            },
            {
              "status": "affected",
              "version": "5.84"
            },
            {
              "status": "affected",
              "version": "5.85"
            },
            {
              "status": "affected",
              "version": "5.86"
            },
            {
              "status": "affected",
              "version": "5.87"
            },
            {
              "status": "affected",
              "version": "5.88"
            },
            {
              "status": "affected",
              "version": "5.89"
            },
            {
              "status": "affected",
              "version": "5.90"
            },
            {
              "status": "affected",
              "version": "5.91"
            },
            {
              "status": "affected",
              "version": "5.92"
            },
            {
              "status": "affected",
              "version": "5.93"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "tool",
          "value": "VulDB GitHub Commit Analyzer"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user\u0027s home or the installation of third party global themes."
        },
        {
          "lang": "de",
          "value": "Es wurde eine problematische Schwachstelle in KDE Plasma Workspace bis 5.93.0 gefunden. Es geht dabei um die Funktion EventPluginsManager::enabledPlugins der Datei components/calendar/eventpluginsmanager.cpp der Komponente Theme File Handler. Dank der Manipulation des Arguments pluginId mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen. Der Patch wird als 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 2.6,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-11T23:00:07.443Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.253407"
        },
        {
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.253407"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-02-11T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-02-11T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-02-11T09:54:22.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "KDE Plasma Workspace Theme File eventpluginsmanager.cpp enabledPlugins path traversal"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-1433",
    "datePublished": "2024-02-11T23:00:07.443Z",
    "dateReserved": "2024-02-11T08:48:58.569Z",
    "dateUpdated": "2025-04-24T15:44:57.998Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-1433\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2024-02-11T23:15:07.850\",\"lastModified\":\"2024-11-21T08:50:34.517\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user\u0027s home or the installation of third party global themes.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en KDE Plasma Workspace hasta 5.93.0. La funci\u00f3n EventPluginsManager::enabledPlugins del archivo componentes/calendar/eventpluginsmanager.cpp del componente Theme File Handler afecta a la funci\u00f3n. La manipulaci\u00f3n del argumento pluginId conduce a un path traversal. Es posible iniciar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El parche se llama 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-253407. NOTA: Esto requiere acceso de escritura a la casa del usuario o la instalaci\u00f3n de temas globales de terceros.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kde:plasma-workspace:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.93.0\",\"matchCriteriaId\":\"F0903CA7-0EEA-4097-84CB-45E4881172EB\"}]}]}],\"references\":[{\"url\":\"https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://vuldb.com/?ctiid.253407\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://vuldb.com/?id.253407\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://vuldb.com/?ctiid.253407\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://vuldb.com/?id.253407\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://vuldb.com/?id.253407\", \"tags\": [\"vdb-entry\", \"technical-description\", \"x_transferred\"]}, {\"url\": \"https://vuldb.com/?ctiid.253407\", \"tags\": [\"signature\", \"permissions-required\", \"x_transferred\"]}, {\"url\": \"https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01\", \"tags\": [\"patch\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T18:40:21.050Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-1433\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-13T15:38:55.464865Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T15:20:37.167Z\"}}], \"cna\": {\"title\": \"KDE Plasma Workspace Theme File eventpluginsmanager.cpp enabledPlugins path traversal\", \"credits\": [{\"lang\": \"en\", \"type\": \"tool\", \"value\": \"VulDB GitHub Commit Analyzer\"}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 3.1, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 3.1, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 2.6, \"vectorString\": \"AV:N/AC:H/Au:N/C:N/I:P/A:N\"}}], \"affected\": [{\"vendor\": \"KDE\", \"modules\": [\"Theme File Handler\"], \"product\": \"Plasma Workspace\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0\"}, {\"status\": \"affected\", \"version\": \"5.1\"}, {\"status\": \"affected\", \"version\": \"5.2\"}, {\"status\": \"affected\", \"version\": \"5.3\"}, {\"status\": \"affected\", \"version\": \"5.4\"}, {\"status\": \"affected\", \"version\": \"5.5\"}, {\"status\": \"affected\", \"version\": \"5.6\"}, {\"status\": \"affected\", \"version\": \"5.7\"}, {\"status\": \"affected\", \"version\": \"5.8\"}, {\"status\": \"affected\", \"version\": \"5.9\"}, {\"status\": \"affected\", \"version\": \"5.10\"}, {\"status\": \"affected\", \"version\": \"5.11\"}, {\"status\": \"affected\", \"version\": \"5.12\"}, {\"status\": \"affected\", \"version\": \"5.13\"}, {\"status\": \"affected\", \"version\": \"5.14\"}, {\"status\": \"affected\", \"version\": \"5.15\"}, {\"status\": \"affected\", \"version\": \"5.16\"}, {\"status\": \"affected\", \"version\": \"5.17\"}, {\"status\": \"affected\", \"version\": \"5.18\"}, {\"status\": \"affected\", \"version\": \"5.19\"}, {\"status\": \"affected\", \"version\": \"5.20\"}, {\"status\": \"affected\", \"version\": \"5.21\"}, {\"status\": \"affected\", \"version\": \"5.22\"}, {\"status\": \"affected\", \"version\": \"5.23\"}, {\"status\": \"affected\", \"version\": \"5.24\"}, {\"status\": \"affected\", \"version\": \"5.25\"}, {\"status\": \"affected\", \"version\": \"5.26\"}, {\"status\": \"affected\", \"version\": \"5.27\"}, {\"status\": \"affected\", \"version\": \"5.28\"}, {\"status\": \"affected\", \"version\": \"5.29\"}, {\"status\": \"affected\", \"version\": \"5.30\"}, {\"status\": \"affected\", \"version\": \"5.31\"}, {\"status\": \"affected\", \"version\": \"5.32\"}, {\"status\": \"affected\", \"version\": \"5.33\"}, {\"status\": \"affected\", \"version\": \"5.34\"}, {\"status\": \"affected\", \"version\": \"5.35\"}, {\"status\": \"affected\", \"version\": \"5.36\"}, {\"status\": \"affected\", \"version\": \"5.37\"}, {\"status\": \"affected\", \"version\": \"5.38\"}, {\"status\": \"affected\", \"version\": \"5.39\"}, {\"status\": \"affected\", \"version\": \"5.40\"}, {\"status\": \"affected\", \"version\": \"5.41\"}, {\"status\": \"affected\", \"version\": \"5.42\"}, {\"status\": \"affected\", \"version\": \"5.43\"}, {\"status\": \"affected\", \"version\": \"5.44\"}, {\"status\": \"affected\", \"version\": \"5.45\"}, {\"status\": \"affected\", \"version\": \"5.46\"}, {\"status\": \"affected\", \"version\": \"5.47\"}, {\"status\": \"affected\", \"version\": \"5.48\"}, {\"status\": \"affected\", \"version\": \"5.49\"}, {\"status\": \"affected\", \"version\": \"5.50\"}, {\"status\": \"affected\", \"version\": \"5.51\"}, {\"status\": \"affected\", \"version\": \"5.52\"}, {\"status\": \"affected\", \"version\": \"5.53\"}, {\"status\": \"affected\", \"version\": \"5.54\"}, {\"status\": \"affected\", \"version\": \"5.55\"}, {\"status\": \"affected\", \"version\": \"5.56\"}, {\"status\": \"affected\", \"version\": \"5.57\"}, {\"status\": \"affected\", \"version\": \"5.58\"}, {\"status\": \"affected\", \"version\": \"5.59\"}, {\"status\": \"affected\", \"version\": \"5.60\"}, {\"status\": \"affected\", \"version\": \"5.61\"}, {\"status\": \"affected\", \"version\": \"5.62\"}, {\"status\": \"affected\", \"version\": \"5.63\"}, {\"status\": \"affected\", \"version\": \"5.64\"}, {\"status\": \"affected\", \"version\": \"5.65\"}, {\"status\": \"affected\", \"version\": \"5.66\"}, {\"status\": \"affected\", \"version\": \"5.67\"}, {\"status\": \"affected\", \"version\": \"5.68\"}, {\"status\": \"affected\", \"version\": \"5.69\"}, {\"status\": \"affected\", \"version\": \"5.70\"}, {\"status\": \"affected\", \"version\": \"5.71\"}, {\"status\": \"affected\", \"version\": \"5.72\"}, {\"status\": \"affected\", \"version\": \"5.73\"}, {\"status\": \"affected\", \"version\": \"5.74\"}, {\"status\": \"affected\", \"version\": \"5.75\"}, {\"status\": \"affected\", \"version\": \"5.76\"}, {\"status\": \"affected\", \"version\": \"5.77\"}, {\"status\": \"affected\", \"version\": \"5.78\"}, {\"status\": \"affected\", \"version\": \"5.79\"}, {\"status\": \"affected\", \"version\": \"5.80\"}, {\"status\": \"affected\", \"version\": \"5.81\"}, {\"status\": \"affected\", \"version\": \"5.82\"}, {\"status\": \"affected\", \"version\": \"5.83\"}, {\"status\": \"affected\", \"version\": \"5.84\"}, {\"status\": \"affected\", \"version\": \"5.85\"}, {\"status\": \"affected\", \"version\": \"5.86\"}, {\"status\": \"affected\", \"version\": \"5.87\"}, {\"status\": \"affected\", \"version\": \"5.88\"}, {\"status\": \"affected\", \"version\": \"5.89\"}, {\"status\": \"affected\", \"version\": \"5.90\"}, {\"status\": \"affected\", \"version\": \"5.91\"}, {\"status\": \"affected\", \"version\": \"5.92\"}, {\"status\": \"affected\", \"version\": \"5.93\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-02-11T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2024-02-11T01:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2024-02-11T09:54:22.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.253407\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.253407\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01\", \"tags\": [\"patch\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user\u0027s home or the installation of third party global themes.\"}, {\"lang\": \"de\", \"value\": \"Es wurde eine problematische Schwachstelle in KDE Plasma Workspace bis 5.93.0 gefunden. Es geht dabei um die Funktion EventPluginsManager::enabledPlugins der Datei components/calendar/eventpluginsmanager.cpp der Komponente Theme File Handler. Dank der Manipulation des Arguments pluginId mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann \\u00fcber das Netzwerk passieren. Die Komplexit\\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen. Der Patch wird als 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01 bezeichnet. Als bestm\\u00f6gliche Massnahme wird Patching empfohlen.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22 Path Traversal\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2024-02-11T23:00:07.443Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-1433\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-24T15:44:57.998Z\", \"dateReserved\": \"2024-02-11T08:48:58.569Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2024-02-11T23:00:07.443Z\", \"assignerShortName\": \"VulDB\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…