Cyber Posture

CVE-2024-51376

High

Published: 12 February 2025

Published
12 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0056 68.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-51376 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 31.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates the user-supplied 'path' parameter in file/downloadFile.action to block directory traversal sequences like '../', preventing unauthorized access to sensitive files.

prevent

Enforces approved access authorizations on file system resources to restrict the application from reading sensitive files outside the intended directory despite traversal attempts.

prevent

Implements boundary protection at external interfaces, such as web application firewalls, to monitor and block incoming requests with path traversal payloads targeting the vulnerable endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Directory traversal in public-facing web app directly enables remote file access (T1190) and local data collection (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Directory Traversal vulnerability in yeqifu carRental v.1.0 allows a remote attacker to obtain sensitive information via the file/downloadFile.action?path= component.

Deeper analysisAI

CVE-2024-51376 is a Directory Traversal vulnerability (CWE-22) in yeqifu carRental version 1.0. The flaw exists in the file/downloadFile.action?path= component, enabling a remote attacker to obtain sensitive information. It was published on 2025-02-12 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact with no impact on integrity or availability.

A remote attacker requires only network access to exploit this vulnerability, with low attack complexity, no privileges, and no user interaction needed. Exploitation allows the attacker to traverse directories and access sensitive files on the affected system, potentially exposing configuration data, user information, or other confidential resources.

Advisories and further details on the vulnerability, including potential mitigation steps, are available in the referenced GitHub repositories: https://github.com/echo0d/vulnerability/blob/main/yeqifu_carRental/DirectoryTraversal.md and https://github.com/yeqifu/carRental/issues/43.

Details

CWE(s)

CVEs Like This One

CVE-2026-23536Shared CWE-22
CVE-2025-23422Shared CWE-22
CVE-2025-8343Shared CWE-22
CVE-2025-10559Shared CWE-22
CVE-2025-67076Shared CWE-22
CVE-2026-5258Shared CWE-22
CVE-2025-25155Shared CWE-22
CVE-2024-13471Shared CWE-22
CVE-2026-27442Shared CWE-22
CVE-2025-8054Shared CWE-22

References