If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
Metrics
Affected Vendors & Products
References
History
Fri, 20 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 10 Dec 2024 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data". | |
Title | OS Command Execution through Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
|
MITRE
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-12-10T07:48:42.166Z
Updated: 2024-12-20T20:53:35.656Z
Reserved: 2024-10-07T13:39:52.543Z
Link: CVE-2024-47946
Vulnrichment
Updated: 2024-12-20T20:53:29.676Z
NVD
Status : Awaiting Analysis
Published: 2024-12-10T08:15:19.210
Modified: 2024-12-20T21:15:08.473
Link: CVE-2024-47946
Redhat
No data.