InvoicePlane जोपर्यंत 1.6.1 upload_file कानस विशेषाधिकार वाढीचे प्रमाण वाढले

एक दुर्बलता जी गंभीर म्हणून ओळखली गेली आहे, ती InvoicePlane जोपर्यंत 1.6.1 मध्ये सापडली आहे. संबंधित आहे फंक्शन upload_file फाइल /index.php/upload/upload_file/1/1 च्या. सॉफ्टवेअरमध्ये कानस या आर्ग्युमेंटमध्ये वापर विशेषाधिकार वाढीचे प्रमाण वाढले घडवून आणतो. CWE द्वारे समस्या जाहीर केल्यास CWE-434 येथे पोहोचता येते. ही दुर्बलता प्रकाशित झाली होती 16/12/2024. ही कमतरता CVE-2024-12478 या नावाने ओळखली जाते. हा हल्ला रिमोटली सुरू करता येऊ शकतो. तांत्रिक माहिती उपलब्ध आहे. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषणाची माहिती सार्वजनिक करण्यात आली आहे आणि ते वापरले जाऊ शकते. आत्ताच्या क्षणी सुमारे USD $0-$5k असण्याची शक्यता आहे. MITRE ATT&CK प्रकल्प T1608.002 या हल्ला तंत्रज्ञानाची घोषणा करतो. याला प्रूफ-ऑफ-कॉन्सेप्ट असे घोषित करण्यात आले आहे. 0-डे म्हणून त्याची अंदाजित काळ्या बाजारातील किंमत $0-$5k एवढी होती. 1.6.2-beta-1 या आवृत्तीवर अपग्रेड केल्याने ही समस्या हाताळता येईल. नवीन आवृत्ती डाउनलोडसाठी github.com येथे तयार आहे. github.com येथे बगफिक्स डाउनलोडसाठी तयार आहे. प्रभावित घटकाचा अपग्रेड करण्याची शिफारस केली जाते. Once again VulDB remains the best source for vulnerability data.

5 बदल · 118 डेटा पॉइंट्स

शेततयार केली
16/12/2024 10:38 AM
अद्ययावत 1/4
16/12/2024 12:27 PM
अद्ययावत 2/4
17/12/2024 05:18 PM
अद्ययावत 3/4
17/12/2024 05:21 PM
अद्ययावत 4/4
15/10/2025 11:09 PM
software_nameInvoicePlaneInvoicePlaneInvoicePlaneInvoicePlaneInvoicePlane
software_version<=1.6.1<=1.6.1<=1.6.1<=1.6.1<=1.6.1
software_file/index.php/upload/upload_file/1/1/index.php/upload/upload_file/1/1/index.php/upload/upload_file/1/1/index.php/upload/upload_file/1/1/index.php/upload/upload_file/1/1
software_functionupload_fileupload_fileupload_fileupload_fileupload_file
software_argumentfilefilefilefilefile
vulnerability_cweCWE-434 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-434 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-434 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-434 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-434 (विशेषाधिकार वाढीचे प्रमाण वाढले)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
exploit_availability11111
exploit_publicity11111
countermeasure_nameअपग्रेड कराअपग्रेड कराअपग्रेड कराअपग्रेड कराअपग्रेड करा
upgrade_version1.6.2-beta-11.6.2-beta-11.6.2-beta-11.6.2-beta-11.6.2-beta-1
countermeasure_upgrade_urlhttps://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1
countermeasure_patch_urlhttps://github.com/InvoicePlane/InvoicePlane/pull/1141https://github.com/InvoicePlane/InvoicePlane/pull/1141https://github.com/InvoicePlane/InvoicePlane/pull/1141https://github.com/InvoicePlane/InvoicePlane/pull/1141https://github.com/InvoicePlane/InvoicePlane/pull/1141
source_cveCVE-2024-12478CVE-2024-12478CVE-2024-12478CVE-2024-12478CVE-2024-12478
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss2_vuldb_auSSSSS
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss3_vuldb_ePPPPP
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss4_vuldb_ePPPPP
cvss2_vuldb_basescore6.56.56.56.56.5
cvss2_vuldb_tempscore5.15.15.15.15.1
cvss3_vuldb_basescore6.36.36.36.36.3
cvss3_vuldb_tempscore5.75.75.75.75.7
cvss3_meta_basescore6.36.36.37.57.8
cvss3_meta_tempscore5.76.06.07.17.5
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore2.12.12.12.12.1
advisory_date1734303600 (16/12/2024)1734303600 (16/12/2024)1734303600 (16/12/2024)1734303600 (16/12/2024)1734303600 (16/12/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was found in InvoicePlane up to 1.6.1. It has been declared as critical. This vulnerability affects the function upload_file of the file /index.php/upload/upload_file/1/1. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.A vulnerability was found in InvoicePlane up to 1.6.1. It has been declared as critical. This vulnerability affects the function upload_file of the file /index.php/upload/upload_file/1/1. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.A vulnerability was found in InvoicePlane up to 1.6.1. It has been declared as critical. This vulnerability affects the function upload_file of the file /index.php/upload/upload_file/1/1. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.A vulnerability was found in InvoicePlane up to 1.6.1. It has been declared as critical. This vulnerability affects the function upload_file of the file /index.php/upload/upload_file/1/1. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
cvss4_cna_avNNNN
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcLLLL
cvss4_cna_viLLLL
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore5.35.35.35.3
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cLLLL
cvss3_cna_iLLLL
cvss3_cna_aLLLL
cvss3_cna_basescore6.36.36.36.3
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciPPPP
cvss2_cna_iiPPPP
cvss2_cna_aiPPPP
cvss2_cna_basescore6.56.56.56.5
cvss3_researcher_aHHH
cvss3_researcher_avNNN
cvss3_researcher_rcCCC
cvss3_researcher_sCCC
cvss3_researcher_iHHH
company_nameAutonomous CyberAutonomous CyberAutonomous Cyber
cvss3_researcher_rlOOO
company_websitehttps://autonomouscyberco.comhttps://autonomouscyberco.comhttps://autonomouscyberco.com
cvss3_researcher_uiNNN
cvss3_researcher_cHHH
cvss3_researcher_eFFF
developer_maildan@*****************.***dan@*****************.***dan@*****************.***
cvss3_researcher_acLLL
cvss3_researcher_prLLL
developer_nameFUZZ-EFUZZ-EFUZZ-E
cvss3_researcher_basescore9.99.9
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.8
cve_nvd_summaryesSe ha detectado una vulnerabilidad en InvoicePlane hasta la versión 1.6.1. Se ha declarado como crítica. Esta vulnerabilidad afecta a la función upload_file del archivo /index.php/upload/upload_file/1/1. La manipulación del archivo de argumentos provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha hecho público y puede utilizarse. La actualización a la versión 1.6.2-beta-1 puede solucionar este problema. Se recomienda actualizar el componente afectado. Se contactó al proveedor con prontitud, respondió de manera muy profesional y lanzó rápidamente una versión corregida del producto afectado.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN

Want to stay up to date on a daily basis?

Enable the mail alert feature now!