An unrestricted upload of file with dangerous type in Automated Logic WebCTRL 7.0 could allow an unauthenticated user to perform remote command execution via a crafted HTTP POST request which could lead to uploading a malicious file.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Automatedlogic
Automatedlogic webctrl |
|
CPEs | cpe:2.3:a:automatedlogic:webctrl:*:*:*:*:*:*:*:* | |
Vendors & Products |
Automatedlogic
Automatedlogic webctrl |
|
Metrics |
ssvc
|
Thu, 21 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unrestricted upload of file with dangerous type in Automated Logic WebCTRL 7.0 could allow an unauthenticated user to perform remote command execution via a crafted HTTP POST request which could lead to uploading a malicious file. | |
Title | Automated Logic WebCTRL and Carrier i-Vu Unrestricted File Upload | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: Carrier
Published: 2024-11-21T15:32:55.593Z
Updated: 2024-11-21T17:37:57.529Z
Reserved: 2024-09-06T16:01:29.505Z
Link: CVE-2024-8525
Vulnrichment
Updated: 2024-11-21T17:34:52.169Z
NVD
Status : Received
Published: 2024-11-21T16:15:27.217
Modified: 2024-11-21T16:15:27.217
Link: CVE-2024-8525
Redhat
No data.