CVE-2024-1651

Torrentpier version 2.4.1 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to insecure deserialization.
Configurations

Configuration 1 (hide)

cpe:2.3:a:torrentpier:torrentpier:2.4.1:*:*:*:*:*:*:*

History

12 Feb 2025, 17:26

Type Values Removed Values Added
First Time Torrentpier
Torrentpier torrentpier
CPE cpe:2.3:a:torrentpier:torrentpier:2.4.1:*:*:*:*:*:*:*
References () https://fluidattacks.com/advisories/xavi/ - () https://fluidattacks.com/advisories/xavi/ - Exploit, Third Party Advisory
References () https://github.com/torrentpier/torrentpier - () https://github.com/torrentpier/torrentpier - Product

21 Nov 2024, 08:51

Type Values Removed Values Added
References () https://fluidattacks.com/advisories/xavi/ - () https://fluidattacks.com/advisories/xavi/ -
References () https://github.com/torrentpier/torrentpier - () https://github.com/torrentpier/torrentpier -

20 Feb 2024, 19:50

Type Values Removed Values Added
Summary
  • (es) Torrentpier versión 2.4.1 permite ejecutar comandos arbitrarios en el servidor. Esto es posible porque la aplicación es vulnerable a una deserialización insegura.

20 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-20 00:15

Updated : 2025-02-12 17:26


NVD link : CVE-2024-1651

Mitre link : CVE-2024-1651

CVE.ORG link : CVE-2024-1651


JSON object : View

Products Affected

torrentpier

  • torrentpier
CWE
CWE-502

Deserialization of Untrusted Data