An arbitrary file upload vulnerability in the file handling module of moziloCMS v2.0 allows attackers to bypass extension restrictions via file renaming, potentially leading to unauthorized file execution or storage of malicious content.
References
History

Tue, 05 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Mozilo
Mozilo mozilocms
Weaknesses CWE-434
CPEs cpe:2.3:a:mozilo:mozilocms:2.0:*:*:*:*:*:*:*
Vendors & Products Mozilo
Mozilo mozilocms
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-04-22T00:00:00

Updated: 2024-11-05T17:07:48.608Z

Reserved: 2024-03-19T00:00:00

Link: CVE-2024-29368

cve-icon Vulnrichment

Updated: 2024-08-02T01:10:54.941Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-22T21:15:49.043

Modified: 2024-11-21T09:07:57.823

Link: CVE-2024-29368

cve-icon Redhat

No data.