CVE-2024-1750

A vulnerability, which was classified as critical, was found in TemmokuMVC up to 2.3. Affected is the function get_img_url/img_replace in the library lib/images_get_down.php of the component Image Download Handler. The manipulation leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254532. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://note.zhaoj.in/share/OrBH8zLKUPOA Broken Link
https://vuldb.com/?ctiid.254532 Permissions Required Third Party Advisory
https://vuldb.com/?id.254532 Third Party Advisory
https://note.zhaoj.in/share/OrBH8zLKUPOA Broken Link
https://vuldb.com/?ctiid.254532 Permissions Required Third Party Advisory
https://vuldb.com/?id.254532 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:temmokumvc:temmokumvc:*:*:*:*:*:*:*:*

History

31 Dec 2024, 15:08

Type Values Removed Values Added
First Time Temmokumvc
Temmokumvc temmokumvc
CPE cpe:2.3:a:temmokumvc:temmokumvc:*:*:*:*:*:*:*:*
References () https://note.zhaoj.in/share/OrBH8zLKUPOA - () https://note.zhaoj.in/share/OrBH8zLKUPOA - Broken Link
References () https://vuldb.com/?ctiid.254532 - () https://vuldb.com/?ctiid.254532 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.254532 - () https://vuldb.com/?id.254532 - Third Party Advisory

21 Nov 2024, 08:51

Type Values Removed Values Added
References () https://note.zhaoj.in/share/OrBH8zLKUPOA - () https://note.zhaoj.in/share/OrBH8zLKUPOA -
References () https://vuldb.com/?ctiid.254532 - () https://vuldb.com/?ctiid.254532 -
References () https://vuldb.com/?id.254532 - () https://vuldb.com/?id.254532 -

29 Feb 2024, 01:43

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en TemmokuMVC hasta 2.3 y clasificada como crítica. La función get_img_url/img_replace en la librería lib/images_get_down.php del componente Image Download Handler es afectada por esta vulnerabilidad. La manipulación conduce a la deserialización. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es difícil. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-254532. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

22 Feb 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-22 20:15

Updated : 2024-12-31 15:08


NVD link : CVE-2024-1750

Mitre link : CVE-2024-1750

CVE.ORG link : CVE-2024-1750


JSON object : View

Products Affected

temmokumvc

  • temmokumvc
CWE
CWE-502

Deserialization of Untrusted Data