An arbitrary file upload vulnerability in the file handling module of moziloCMS v2.0 allows attackers to bypass extension restrictions via file renaming, potentially leading to unauthorized file execution or storage of malicious content.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/becpn/mozilocms |
History
Tue, 05 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mozilo
Mozilo mozilocms |
|
Weaknesses | CWE-434 | |
CPEs | cpe:2.3:a:mozilo:mozilocms:2.0:*:*:*:*:*:*:* | |
Vendors & Products |
Mozilo
Mozilo mozilocms |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-04-22T00:00:00
Updated: 2024-11-05T17:07:48.608Z
Reserved: 2024-03-19T00:00:00
Link: CVE-2024-29368
Vulnrichment
Updated: 2024-08-02T01:10:54.941Z
NVD
Status : Awaiting Analysis
Published: 2024-04-22T21:15:49.043
Modified: 2024-11-21T09:07:57.823
Link: CVE-2024-29368
Redhat
No data.