An unrestricted upload of file with dangerous type in Automated Logic WebCTRL 7.0 could allow an unauthenticated user to perform remote command execution via a crafted HTTP POST request which could lead to uploading a malicious file.
History

Thu, 21 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Automatedlogic
Automatedlogic webctrl
CPEs cpe:2.3:a:automatedlogic:webctrl:*:*:*:*:*:*:*:*
Vendors & Products Automatedlogic
Automatedlogic webctrl
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
Description An unrestricted upload of file with dangerous type in Automated Logic WebCTRL 7.0 could allow an unauthenticated user to perform remote command execution via a crafted HTTP POST request which could lead to uploading a malicious file.
Title Automated Logic WebCTRL and Carrier i-Vu Unrestricted File Upload
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Carrier

Published: 2024-11-21T15:32:55.593Z

Updated: 2024-11-21T17:37:57.529Z

Reserved: 2024-09-06T16:01:29.505Z

Link: CVE-2024-8525

cve-icon Vulnrichment

Updated: 2024-11-21T17:34:52.169Z

cve-icon NVD

Status : Received

Published: 2024-11-21T16:15:27.217

Modified: 2024-11-21T16:15:27.217

Link: CVE-2024-8525

cve-icon Redhat

No data.