cvelist/2024/5xxx/CVE-2024-5745.json

110 lines
4.0 KiB
JSON
Raw Normal View History

2024-06-07 13:00:34 +00:00
{
2024-06-07 18:00:34 +00:00
"data_version": "4.0",
2024-06-07 13:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-5745",
2024-06-07 18:00:34 +00:00
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
2024-06-07 13:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-06-07 18:00:34 +00:00
"value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/modules/product/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-267414 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Es wurde eine kritische Schwachstelle in itsourcecode Bakery Online Ordering System 1.0 ausgemacht. Betroffen hiervon ist ein unbekannter Ablauf der Datei /admin/modules/product/controller.php?action=add. Durch Manipulation des Arguments image mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-434 Unrestricted Upload",
"cweId": "CWE-434"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "itsourcecode",
"product": {
"product_data": [
{
"product_name": "Bakery Online Ordering System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.267414",
"refsource": "MISC",
"name": "https://vuldb.com/?id.267414"
},
{
"url": "https://vuldb.com/?ctiid.267414",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.267414"
},
{
"url": "https://vuldb.com/?submit.351827",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.351827"
},
{
"url": "https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md",
"refsource": "MISC",
"name": "https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md"
}
]
},
"credits": [
{
"lang": "en",
"value": "N3xu5Cr4ck37 (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
2024-06-08 04:00:37 +00:00
"baseScore": 7.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
2024-06-07 18:00:34 +00:00
},
{
"version": "3.0",
2024-06-08 04:00:37 +00:00
"baseScore": 7.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "HIGH"
2024-06-07 18:00:34 +00:00
},
{
"version": "2.0",
2024-06-08 04:00:37 +00:00
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
2024-06-07 13:00:34 +00:00
}
]
}
}