{ "id": "CVE-2024-33752", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T14:15:08.003", "lastModified": "2024-05-06T16:00:59.253", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability exists in emlog pro 2.3.0 and pro 2.3.2 at admin/views/plugin.php that could be exploited by a remote attacker to submit a special request to upload a malicious file to execute arbitrary code." }, { "lang": "es", "value": "Existe una vulnerabilidad de carga de archivos arbitrarios en emlog pro 2.3.0 y pro 2.3.2 en admin/views/plugin.php que podr\u00eda ser aprovechada por un atacante remoto para enviar una solicitud especial para cargar un archivo malicioso para ejecutar c\u00f3digo arbitrario." } ], "metrics": {}, "references": [ { "url": "https://github.com/Myanemo/emlogpro/blob/main/emlog%20pro2.3.2%20File%20upload%20to%20getshell.md", "source": "cve@mitre.org" } ] }