Description
JPress through 5.1.1 on Windows has an arbitrary file upload vulnerability that could cause arbitrary code execution via ::$DATA to AttachmentController, such as a .jsp::$DATA file to io.jpress.web.commons.controller.AttachmentController#upload. NOTE: this is unrelated to the attack vector for CVE-2024-32358.
References
https://cwe.mitre.org/data/definitions/69.html
Not Applicable
https://github.com/JPressProjects/jpress/issues/188
ExploitIssue TrackingVendor Advisory
https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033
ExploitThird Party Advisory
Weaknesses
134c704f-9b21-4f2e-91b3-4a467353bcc0
Secondary
CWE-69
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2024-08-21T23:15:03.540Z
1 year agoLast modified
2025-06-03T12:25:22.093Z
7 months ago