Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-32491

Опубликовано: 29 апр. 2024
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
znunyfixed6.5.8-1package
znunyno-dsabookwormpackage

Примечания

  • https://www.znuny.org/en/advisories/zsa-2024-01

EPSS

Процентиль: 69%
0.00585
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 2 года назад

An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.

CVSS3: 9.8
nvd
почти 2 года назад

An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.

CVSS3: 9.8
github
почти 2 года назад

An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.

EPSS

Процентиль: 69%
0.00585
Низкий