Action not permitted
Modal body text goes here.
Modal Title
Modal Body
GHSA-6G65-3CF7-CHXV
Vulnerability from github – Published: 2024-02-12 00:30 – Updated: 2024-02-12 00:30A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user's home or the installation of third party global themes.
{
"affected": [],
"aliases": [
"CVE-2024-1433"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-02-11T23:15:07Z",
"severity": "LOW"
},
"details": "A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user\u0027s home or the installation of third party global themes.",
"id": "GHSA-6g65-3cf7-chxv",
"modified": "2024-02-12T00:30:22Z",
"published": "2024-02-12T00:30:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1433"
},
{
"type": "WEB",
"url": "https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.253407"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.253407"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
]
}
CVE-2024-1433 (GCVE-0-2024-1433)
Vulnerability from cvelistv5 – Published: 2024-02-11 23:00 – Updated: 2025-04-24 15:44- CWE-22 - Path Traversal
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| KDE | Plasma Workspace |
Affected:
5.0
Affected: 5.1 Affected: 5.2 Affected: 5.3 Affected: 5.4 Affected: 5.5 Affected: 5.6 Affected: 5.7 Affected: 5.8 Affected: 5.9 Affected: 5.10 Affected: 5.11 Affected: 5.12 Affected: 5.13 Affected: 5.14 Affected: 5.15 Affected: 5.16 Affected: 5.17 Affected: 5.18 Affected: 5.19 Affected: 5.20 Affected: 5.21 Affected: 5.22 Affected: 5.23 Affected: 5.24 Affected: 5.25 Affected: 5.26 Affected: 5.27 Affected: 5.28 Affected: 5.29 Affected: 5.30 Affected: 5.31 Affected: 5.32 Affected: 5.33 Affected: 5.34 Affected: 5.35 Affected: 5.36 Affected: 5.37 Affected: 5.38 Affected: 5.39 Affected: 5.40 Affected: 5.41 Affected: 5.42 Affected: 5.43 Affected: 5.44 Affected: 5.45 Affected: 5.46 Affected: 5.47 Affected: 5.48 Affected: 5.49 Affected: 5.50 Affected: 5.51 Affected: 5.52 Affected: 5.53 Affected: 5.54 Affected: 5.55 Affected: 5.56 Affected: 5.57 Affected: 5.58 Affected: 5.59 Affected: 5.60 Affected: 5.61 Affected: 5.62 Affected: 5.63 Affected: 5.64 Affected: 5.65 Affected: 5.66 Affected: 5.67 Affected: 5.68 Affected: 5.69 Affected: 5.70 Affected: 5.71 Affected: 5.72 Affected: 5.73 Affected: 5.74 Affected: 5.75 Affected: 5.76 Affected: 5.77 Affected: 5.78 Affected: 5.79 Affected: 5.80 Affected: 5.81 Affected: 5.82 Affected: 5.83 Affected: 5.84 Affected: 5.85 Affected: 5.86 Affected: 5.87 Affected: 5.88 Affected: 5.89 Affected: 5.90 Affected: 5.91 Affected: 5.92 Affected: 5.93 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-1433",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-13T15:38:55.464865Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-24T15:44:57.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:40:21.050Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"technical-description",
"x_transferred"
],
"url": "https://vuldb.com/?id.253407"
},
{
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.253407"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Theme File Handler"
],
"product": "Plasma Workspace",
"vendor": "KDE",
"versions": [
{
"status": "affected",
"version": "5.0"
},
{
"status": "affected",
"version": "5.1"
},
{
"status": "affected",
"version": "5.2"
},
{
"status": "affected",
"version": "5.3"
},
{
"status": "affected",
"version": "5.4"
},
{
"status": "affected",
"version": "5.5"
},
{
"status": "affected",
"version": "5.6"
},
{
"status": "affected",
"version": "5.7"
},
{
"status": "affected",
"version": "5.8"
},
{
"status": "affected",
"version": "5.9"
},
{
"status": "affected",
"version": "5.10"
},
{
"status": "affected",
"version": "5.11"
},
{
"status": "affected",
"version": "5.12"
},
{
"status": "affected",
"version": "5.13"
},
{
"status": "affected",
"version": "5.14"
},
{
"status": "affected",
"version": "5.15"
},
{
"status": "affected",
"version": "5.16"
},
{
"status": "affected",
"version": "5.17"
},
{
"status": "affected",
"version": "5.18"
},
{
"status": "affected",
"version": "5.19"
},
{
"status": "affected",
"version": "5.20"
},
{
"status": "affected",
"version": "5.21"
},
{
"status": "affected",
"version": "5.22"
},
{
"status": "affected",
"version": "5.23"
},
{
"status": "affected",
"version": "5.24"
},
{
"status": "affected",
"version": "5.25"
},
{
"status": "affected",
"version": "5.26"
},
{
"status": "affected",
"version": "5.27"
},
{
"status": "affected",
"version": "5.28"
},
{
"status": "affected",
"version": "5.29"
},
{
"status": "affected",
"version": "5.30"
},
{
"status": "affected",
"version": "5.31"
},
{
"status": "affected",
"version": "5.32"
},
{
"status": "affected",
"version": "5.33"
},
{
"status": "affected",
"version": "5.34"
},
{
"status": "affected",
"version": "5.35"
},
{
"status": "affected",
"version": "5.36"
},
{
"status": "affected",
"version": "5.37"
},
{
"status": "affected",
"version": "5.38"
},
{
"status": "affected",
"version": "5.39"
},
{
"status": "affected",
"version": "5.40"
},
{
"status": "affected",
"version": "5.41"
},
{
"status": "affected",
"version": "5.42"
},
{
"status": "affected",
"version": "5.43"
},
{
"status": "affected",
"version": "5.44"
},
{
"status": "affected",
"version": "5.45"
},
{
"status": "affected",
"version": "5.46"
},
{
"status": "affected",
"version": "5.47"
},
{
"status": "affected",
"version": "5.48"
},
{
"status": "affected",
"version": "5.49"
},
{
"status": "affected",
"version": "5.50"
},
{
"status": "affected",
"version": "5.51"
},
{
"status": "affected",
"version": "5.52"
},
{
"status": "affected",
"version": "5.53"
},
{
"status": "affected",
"version": "5.54"
},
{
"status": "affected",
"version": "5.55"
},
{
"status": "affected",
"version": "5.56"
},
{
"status": "affected",
"version": "5.57"
},
{
"status": "affected",
"version": "5.58"
},
{
"status": "affected",
"version": "5.59"
},
{
"status": "affected",
"version": "5.60"
},
{
"status": "affected",
"version": "5.61"
},
{
"status": "affected",
"version": "5.62"
},
{
"status": "affected",
"version": "5.63"
},
{
"status": "affected",
"version": "5.64"
},
{
"status": "affected",
"version": "5.65"
},
{
"status": "affected",
"version": "5.66"
},
{
"status": "affected",
"version": "5.67"
},
{
"status": "affected",
"version": "5.68"
},
{
"status": "affected",
"version": "5.69"
},
{
"status": "affected",
"version": "5.70"
},
{
"status": "affected",
"version": "5.71"
},
{
"status": "affected",
"version": "5.72"
},
{
"status": "affected",
"version": "5.73"
},
{
"status": "affected",
"version": "5.74"
},
{
"status": "affected",
"version": "5.75"
},
{
"status": "affected",
"version": "5.76"
},
{
"status": "affected",
"version": "5.77"
},
{
"status": "affected",
"version": "5.78"
},
{
"status": "affected",
"version": "5.79"
},
{
"status": "affected",
"version": "5.80"
},
{
"status": "affected",
"version": "5.81"
},
{
"status": "affected",
"version": "5.82"
},
{
"status": "affected",
"version": "5.83"
},
{
"status": "affected",
"version": "5.84"
},
{
"status": "affected",
"version": "5.85"
},
{
"status": "affected",
"version": "5.86"
},
{
"status": "affected",
"version": "5.87"
},
{
"status": "affected",
"version": "5.88"
},
{
"status": "affected",
"version": "5.89"
},
{
"status": "affected",
"version": "5.90"
},
{
"status": "affected",
"version": "5.91"
},
{
"status": "affected",
"version": "5.92"
},
{
"status": "affected",
"version": "5.93"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "tool",
"value": "VulDB GitHub Commit Analyzer"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user\u0027s home or the installation of third party global themes."
},
{
"lang": "de",
"value": "Es wurde eine problematische Schwachstelle in KDE Plasma Workspace bis 5.93.0 gefunden. Es geht dabei um die Funktion EventPluginsManager::enabledPlugins der Datei components/calendar/eventpluginsmanager.cpp der Komponente Theme File Handler. Dank der Manipulation des Arguments pluginId mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen. Der Patch wird als 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 2.6,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-11T23:00:07.443Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.253407"
},
{
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.253407"
},
{
"tags": [
"patch"
],
"url": "https://github.com/KDE/plasma-workspace/commit/6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-02-11T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-02-11T01:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-02-11T09:54:22.000Z",
"value": "VulDB entry last update"
}
],
"title": "KDE Plasma Workspace Theme File eventpluginsmanager.cpp enabledPlugins path traversal"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-1433",
"datePublished": "2024-02-11T23:00:07.443Z",
"dateReserved": "2024-02-11T08:48:58.569Z",
"dateUpdated": "2025-04-24T15:44:57.998Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.