Description
Torrentpier version 2.4.1 allows executing arbitrary commands on the server.

This is possible because the application is vulnerable to insecure deserialization.




Published: 2024-02-19
Score: 10 Critical
EPSS: 80.6% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5rwm-2xw8-hh9p Deserialization of Untrusted Data in Torrentpier
History

Wed, 12 Feb 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Torrentpier
Torrentpier torrentpier
CPEs cpe:2.3:a:torrentpier:torrentpier:2.4.1:*:*:*:*:*:*:*
Vendors & Products Torrentpier
Torrentpier torrentpier

Subscriptions

Torrentpier Torrentpier
cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published:

Updated: 2024-08-27T18:42:28.186Z

Reserved: 2024-02-19T23:43:14.777Z

Link: CVE-2024-1651

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:20.672Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-20T00:15:14.847

Modified: 2025-02-12T17:26:55.357

Link: CVE-2024-1651

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses