Products
JPress
- up to 5.1.1
JPress
- 5.1.1
Source
cve@mitre.org
Tags
CVE-2024-43033 details
Published : Aug. 22, 2024, 1:15 a.m.
Last Modified : Aug. 22, 2024, 4:35 p.m.
Last Modified : Aug. 22, 2024, 4:35 p.m.
Description
JPress through 5.1.1 on Windows has an arbitrary file upload vulnerability that could cause arbitrary code execution via ::$DATA to AttachmentController, such as a .jsp::$DATA file to io.jpress.web.commons.controller.AttachmentController#upload. NOTE: this is unrelated to the attack vector for CVE-2024-32358.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8.8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-69 | Improper Handling of Windows ::DATA Alternate Data Stream | The product does not properly prevent access to, or detect usage of, alternate data streams (ADS). |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
8.8
Exploitability Score
2.8
Impact Score
5.9
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://cwe.mitre.org/data/definitions/69.html | cve@mitre.org |
https://github.com/JPressProjects/jpress/issues/188 | cve@mitre.org |
https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033 | cve@mitre.org |
This website uses the NVD API, but is not approved or certified by it.