CVE-2024-9280

A vulnerability has been found in kalvinGit kvf-admin up to f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff and classified as critical. This vulnerability affects the function fileUpload of the file FileUploadKit.java. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
References
Link Resource
https://github.com/Arvin-Shi/111/issues/1 Broken Link
https://vuldb.com/?ctiid.278662 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.278662 Third Party Advisory VDB Entry
https://vuldb.com/?submit.410994 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:kvf-admin_project:kvf-admin:2022-02-12:*:*:*:*:*:*:*

History

04 Oct 2024, 18:00

Type Values Removed Values Added
References () https://github.com/Arvin-Shi/111/issues/1 - () https://github.com/Arvin-Shi/111/issues/1 - Broken Link
References () https://vuldb.com/?ctiid.278662 - () https://vuldb.com/?ctiid.278662 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.278662 - () https://vuldb.com/?id.278662 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.410994 - () https://vuldb.com/?submit.410994 - Third Party Advisory, VDB Entry
First Time Kvf-admin Project
Kvf-admin Project kvf-admin
CPE cpe:2.3:a:kvf-admin_project:kvf-admin:2022-02-12:*:*:*:*:*:*:*
CVSS v2 : 5.8
v3 : 4.7
v2 : 5.8
v3 : 9.8

30 Sep 2024, 12:45

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en kalvinGit kvf-admin hasta f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff y se ha clasificado como crítica. Esta vulnerabilidad afecta a la función fileUpload del archivo FileUploadKit.java. La manipulación del argumento file da lugar a una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha hecho público y puede utilizarse. Este producto utiliza la entrega continua con versiones sucesivas. Por lo tanto, no hay disponibles detalles de las versiones afectadas ni de las versiones actualizadas.

27 Sep 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-27 12:15

Updated : 2024-10-04 18:00


NVD link : CVE-2024-9280

Mitre link : CVE-2024-9280

CVE.ORG link : CVE-2024-9280


JSON object : View

Products Affected

kvf-admin_project

  • kvf-admin
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type