[Japanese]

JVNDB-2024-000098

Multiple products from KINGSOFT JAPAN vulnerable to path traversal

Overview

KINGSOFT JAPAN, INC. provides Kingsoft Office Software's WPS Office and its related products localized for Japan.

WPS Office and its related products provided by KINGSOFT JAPAN, INC. contain a path traversal vulnerability (CWE-22, CVE-2024-7262, CVE-2024-7263)) due to inadequate file path validation by promecefpluginhost.exe.


Note that, a report has been published describing that "WPS Office provided by Kingsoft Office Software is affected to this vulnerability and exploitation is observed".


KINGSOFT JAPAN, INC. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and KINGSOFT JAPAN, INC. coordinated under the Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 7.8 (High) [IPA Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Affected Products


KINGSOFT, INC.
  • KINGSOFT PDF Pro Ver.11.2.0.10696 and earlier
  • WPS Cloud (Desktop application for Windows) Ver.11.2.0.10693 and earlier
  • WPS Cloud Pro (Desktop application for Windows) Ver.11.2.0.10693 and earlier
  • WPS Office2 for Windows Ver.11.2.0.10693 and earlier

Impact

If a user clicks on a link embeded in a crafted file, arbitrary code may be executed on the user's Windows system.
Solution

[Update the software]
Update the software to the latest version according to the information provided by the developer.
Vendor Information

KINGSOFT, INC.
CWE (What is CWE?)

  1. Path Traversal(CWE-22) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2024-7262
  2. CVE-2024-7263
References

  1. JVN : JVN#32529796
  2. Related document : Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Revision History

  • [2024/09/06]
      Web page was published