cve/2024/CVE-2024-24550.md

20 lines
1.2 KiB
Markdown
Raw Normal View History

2024-07-25 21:25:12 +00:00
### [CVE-2024-24550](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24550)
![](https://img.shields.io/static/v1?label=Product&message=Bludit&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%203.14.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20('Command%20Injection')&color=brighgreen)
### Description
A security vulnerability has been identified in Bludit, allowing attackers with knowledge of the API token to upload arbitrary files through the File API which leads to arbitrary code execution on the server. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
### POC
#### Reference
- https://www.redguard.ch/blog/2024/06/20/security-advisory-bludit/
#### Github
No PoCs found on GitHub currently.