A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. If the public view setting is enabled, a attacker can upload a PHP-file that will be available for execution for a few milliseconds before it is removed, leading to execution of code on the underlying system. The vulnerability has been remediated in version 1.52.02.
References
History

Thu, 19 Sep 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Soplanning
Soplanning soplanning
CPEs cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:*
Vendors & Products Soplanning
Soplanning soplanning

Thu, 12 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared So Planning
So Planning simple Online Planning
CPEs cpe:2.3:a:so_planning:simple_online_planning:*:*:*:*:*:*:*:*
Vendors & Products So Planning
So Planning simple Online Planning
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 14:00:00 +0000

Type Values Removed Values Added
Description A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. If the public view setting is enabled, a attacker can upload a PHP-file that will be available for execution for a few milliseconds before it is removed, leading to execution of code on the underlying system. The vulnerability has been remediated in version 1.52.02.
Title Remote Code Execution through File Upload in SOPlanning before 1.52.02
Weaknesses CWE-367
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:I/V:C/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: DIVD

Published: 2024-09-11T13:41:16.662Z

Updated: 2024-09-12T13:13:36.948Z

Reserved: 2024-02-19T19:21:08.620Z

Link: CVE-2024-27114

cve-icon Vulnrichment

Updated: 2024-09-12T13:13:30.692Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-11T14:15:13.040

Modified: 2024-09-19T14:27:11.790

Link: CVE-2024-27114

cve-icon Redhat

No data.