JFinalCMS har 20240903 com.cms.util.TemplateUtils /admin/template/update fileName Dafiyar fayil ɗin cikin kundin ajiyar bayanai

Wuro vulnerability wey an yi classify sey kura an gano shi a cikin JFinalCMS har 20240903. Gaskiya, update na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /admin/template/update na cikin fayil, com.cms.util.TemplateUtils na cikin sashi. Ngam manipulation of the argument fileName shi Dafiyar fayil ɗin cikin kundin ajiyar bayanai. CWE shidin ka a yi bayani matsala sai ya kai CWE-22. Gaskiya, laifi an fitar da shi 09/11/2024 a matsayin IAOSJG. Advisory ɗin ana rabawa don saukewa a gitee.com. Wannan rauni ana sayar da shi da suna CVE-2024-8706. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

2 Goyarwa · 98 Datenpunkte

FurɗeSúgá
09/11/2024 18:33
Gargadi 1/1
06/06/2025 05:38
software_nameJFinalCMSJFinalCMS
software_version<=20240903<=20240903
software_componentcom.cms.util.TemplateUtilscom.cms.util.TemplateUtils
software_file/admin/template/update/admin/template/update
software_functionupdateupdate
software_argumentfileNamefileName
vulnerability_cweCWE-22 (Dafiyar fayil ɗin cikin kundin ajiyar bayanai)CWE-22 (Dafiyar fayil ɗin cikin kundin ajiyar bayanai)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iNN
cvss3_vuldb_aNN
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_identifierIAOSJGIAOSJG
advisory_urlhttps://gitee.com/heyewei/JFinalcms/issues/IAOSJGhttps://gitee.com/heyewei/JFinalcms/issues/IAOSJG
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/xingjiuW/cve/blob/main/wh.mdhttps://github.com/xingjiuW/cve/blob/main/wh.md
source_cveCVE-2024-8706CVE-2024-8706
cna_responsibleVulDBVulDB
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiNN
cvss2_vuldb_aiNN
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viNN
cvss4_vuldb_vaNN
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore4.04.0
cvss2_vuldb_tempscore3.43.4
cvss3_vuldb_basescore4.34.3
cvss3_vuldb_tempscore3.93.9
cvss3_meta_basescore4.35.0
cvss3_meta_tempscore3.94.9
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1726005600 (09/11/2024)1726005600 (09/11/2024)
price_0day$0-$5k$0-$5k
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viN
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iN
cvss3_cna_aN
cvss3_cna_basescore4.3
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iN
cvss3_nvd_aN
cvss3_nvd_basescore6.5
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiN
cvss2_cna_aiN
cvss2_cna_basescore4
cve_nvd_summaryA vulnerability was found in JFinalCMS up to 20240903. It has been classified as problematic. This affects the function update of the file /admin/template/update of the component com.cms.util.TemplateUtils. The manipulation of the argument fileName leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en JFinalCMS hasta el 20240903. Se ha clasificado como problemática. Afecta a la función update del archivo /admin/template/update del componente com.cms.util.TemplateUtils. La manipulación del argumento fileName provoca un path traversal. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN

Might our Artificial Intelligence support you?

Check our Alexa App!