A vulnerability has been found in Juanpao JPShop up to 1.5.02 and classified as critical. Affected by this vulnerability is the function actionUpdate of the file /api/controllers/common/UploadsController.php. The manipulation of the argument imgage leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-253003.
References
Link | Resource |
---|---|
https://vuldb.com/?id.253003 | Permissions Required Third Party Advisory |
https://vuldb.com/?ctiid.253003 | Permissions Required Third Party Advisory |
https://note.zhaoj.in/share/f8b2IX7GsZS5 | Broken Link |
Configurations
History
14 Feb 2024, 18:17
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:juanpao:jpshop:*:*:*:*:*:*:*:* | |
References | () https://vuldb.com/?ctiid.253003 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.253003 - Permissions Required, Third Party Advisory | |
References | () https://note.zhaoj.in/share/f8b2IX7GsZS5 - Broken Link | |
First Time |
Juanpao
Juanpao jpshop |
07 Feb 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-07 00:15
Updated : 2024-05-17 02:35
NVD link : CVE-2024-1264
Mitre link : CVE-2024-1264
JSON object : View
Products Affected
juanpao
- jpshop
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type