CVE-2024-42733

An issue in Docmosis Tornado v.2.9.7 and before allows a remote attacker to execute arbitrary code via a crafted script to the UNC path input
Configurations

Configuration 1 (hide)

cpe:2.3:a:docmosis:tornado:*:*:*:*:*:*:*:*

History

23 Jun 2025, 19:40

Type Values Removed Values Added
Summary
  • (es) Un problema en Docmosis Tornado v.2.9.7 y anteriores permite que un atacante remoto ejecute código arbitrario a través de un script manipulado específicamente para la entrada de la ruta UNC.
References () https://github.com/Docmosis/tornado-docker/issues/14 - () https://github.com/Docmosis/tornado-docker/issues/14 - Exploit
References () https://github.com/Marsman1996/pocs/blob/master/redox/CVE-2024-57492/README.md - () https://github.com/Marsman1996/pocs/blob/master/redox/CVE-2024-57492/README.md - Not Applicable
CPE cpe:2.3:a:docmosis:tornado:*:*:*:*:*:*:*:*
First Time Docmosis
Docmosis tornado

10 Mar 2025, 17:15

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

07 Mar 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-07 21:15

Updated : 2025-06-23 19:40


NVD link : CVE-2024-42733

Mitre link : CVE-2024-42733

CVE.ORG link : CVE-2024-42733


JSON object : View

Products Affected

docmosis

  • tornado
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')