A vulnerability, which was classified as critical, has been found in SourceCodester Petshop Management System 1.0. This issue affects some unknown processing of the file /controllers/add_client.php. The manipulation of the argument image_profile leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Petshop_Management_System/Petshop_Management_System%20add_client.php%20any%20file%20upload.md | Exploit |
https://vuldb.com/?ctiid.276221 | Permissions Required |
https://vuldb.com/?id.276221 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.399662 | Third Party Advisory VDB Entry |
https://www.sourcecodester.com/ | Product |
Configurations
History
04 Sep 2024, 16:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/enjoyworld/webray.com.cn/blob/main/cves/Petshop_Management_System/Petshop_Management_System%20add_client.php%20any%20file%20upload.md - Exploit | |
References | () https://vuldb.com/?ctiid.276221 - Permissions Required | |
References | () https://vuldb.com/?id.276221 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.399662 - Third Party Advisory, VDB Entry | |
References | () https://www.sourcecodester.com/ - Product | |
First Time |
Nelzkie15
Nelzkie15 petshop Management System |
|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
CPE | cpe:2.3:a:nelzkie15:petshop_management_system:1.0:*:*:*:*:*:*:* |
03 Sep 2024, 12:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Aug 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-30 16:15
Updated : 2024-09-04 16:34
NVD link : CVE-2024-8342
Mitre link : CVE-2024-8342
CVE.ORG link : CVE-2024-8342
JSON object : View
Products Affected
nelzkie15
- petshop_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type