CVE-2024-54448

The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:community:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:enterprise:*:*:*

History

07 Nov 2025, 02:21

Type Values Removed Values Added
CPE cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:community:*:*:*
cpe:2.3:a:logicaldoc:logicaldoc:*:*:*:*:enterprise:*:*:*
First Time Logicaldoc logicaldoc
Logicaldoc
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
Summary
  • (es) Los atacantes pueden explotar la funcionalidad de Automation Scripting para ejecutar comandos arbitrarios en el sistema operativo subyacente. Para llevar a cabo el ataque, se requiere una cuenta con privilegios de administrador o con acceso explícito para usar Automation Scripting. Esta vulnerabilidad permitiría a un atacante ejecutar comandos de su elección en el sistema operativo subyacente del servidor web que ejecuta LogicalDOC.
References () https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html - () https://www.blackduck.com/blog/cyrc-advisory-logicaldoc.html - Third Party Advisory

14 Mar 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-14 18:15

Updated : 2025-11-07 02:21


NVD link : CVE-2024-54448

Mitre link : CVE-2024-54448

CVE.ORG link : CVE-2024-54448


JSON object : View

Products Affected

logicaldoc

  • logicaldoc
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')