An unrestricted upload of file with dangerous type in Automated Logic WebCTRL 7.0 could allow an unauthenticated user to perform remote command execution via a crafted HTTP POST request which could lead to uploading a malicious file.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automatedlogic
Automatedlogic webctrl |
|
| CPEs | cpe:2.3:a:automatedlogic:webctrl:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Automatedlogic
Automatedlogic webctrl |
|
| Metrics |
ssvc
|
Thu, 21 Nov 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unrestricted upload of file with dangerous type in Automated Logic WebCTRL 7.0 could allow an unauthenticated user to perform remote command execution via a crafted HTTP POST request which could lead to uploading a malicious file. | |
| Title | Automated Logic WebCTRL and Carrier i-Vu Unrestricted File Upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Carrier
Published: 2024-11-21T15:32:55.593Z
Updated: 2024-11-21T17:37:57.529Z
Reserved: 2024-09-06T16:01:29.505Z
Link: CVE-2024-8525
Updated: 2024-11-21T17:34:52.169Z
Status : Received
Published: 2024-11-21T16:15:27.217
Modified: 2024-11-21T16:15:27.217
Link: CVE-2024-8525
No data.