If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
History

Fri, 20 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Dec 2024 08:00:00 +0000

Type Values Removed Values Added
Description If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
Title OS Command Execution through Arbitrary File Upload
Weaknesses CWE-434
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2024-12-10T07:48:42.166Z

Updated: 2024-12-20T20:53:35.656Z

Reserved: 2024-10-07T13:39:52.543Z

Link: CVE-2024-47946

cve-icon Vulnrichment

Updated: 2024-12-20T20:53:29.676Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-10T08:15:19.210

Modified: 2024-12-20T21:15:08.473

Link: CVE-2024-47946

cve-icon Redhat

No data.