Published:2024/09/06  Last Updated:2024/09/06

JVN#32529796
Multiple products from KINGSOFT JAPAN vulnerable to path traversal

Overview

Multiple products from KINGSOFT JAPAN contain a path traversal vulnerability.

Products Affected

  • WPS Office2 for Windows Ver.11.2.0.10693 and earlier
  • WPS Cloud (Desktop application for Windows) Ver.11.2.0.10693 and earlier
  • WPS Cloud Pro (Desktop application for Windows) Ver.11.2.0.10693 and earlier
  • KINGSOFT PDF Pro Ver.11.2.0.10696 and earlier

Description

KINGSOFT JAPAN, INC. provides Kingsoft Office Software's WPS Office and its related products localized for Japan.
WPS Office and its related products provided by KINGSOFT JAPAN, INC. contain a path traversal vulnerability (CWE-22, CVE-2024-7262, CVE-2024-7263) due to inadequate file path validation by promecefpluginhost.exe.

Note that, a report has been published describing that "WPS Office provided by Kingsoft Office Software is affected to this vulnerability and exploitation is observed".

Impact

If a user clicks on a link embeded in a crafted file, arbitrary code may be executed on the user's Windows system.

Solution

Update the software
Update the software to the latest version according to the information provided by the developer.

Vendor Status

References

  1. ESET
    Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score: 7.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

KINGSOFT JAPAN, INC. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and KINGSOFT JAPAN, INC. coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-7262
CVE-2024-7263
JVN iPedia JVNDB-2024-000098