Products
CodeAstro Online Railway Reservation System
- 1.0
Source
cna@vuldb.com
Tags
CVE-2024-7910 details
Published : Aug. 18, 2024, 7:15 p.m.
Last Modified : Aug. 18, 2024, 7:15 p.m.
Last Modified : Aug. 18, 2024, 7:15 p.m.
Description
A vulnerability was found in CodeAstro Online Railway Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/emp-profile-avatar.php of the component Profile Photo Update Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
1 | 2 | 3 | 4.7 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-434 | Unrestricted Upload of File with Dangerous Type | The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
Base Score
4.7
Exploitability Score
1.2
Impact Score
3.4
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
References
URL | Source |
---|---|
https://github.com/CYB84/CVE_Writeup/blob/main/Online%20Railway%20Reservation%20System/RCE%20via%20File%20Upload.md | cna@vuldb.com |
https://vuldb.com/?ctiid.275036 | cna@vuldb.com |
https://vuldb.com/?id.275036 | cna@vuldb.com |
https://vuldb.com/?submit.391650 | cna@vuldb.com |
This website uses the NVD API, but is not approved or certified by it.