An arbitrary file upload vulnerability in the file handling module of moziloCMS v2.0 allows attackers to bypass extension restrictions via file renaming, potentially leading to unauthorized file execution or storage of malicious content.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/becpn/mozilocms |
|
History
Tue, 05 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mozilo
Mozilo mozilocms |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:mozilo:mozilocms:2.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Mozilo
Mozilo mozilocms |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-05T17:07:48.608Z
Reserved: 2024-03-19T00:00:00
Link: CVE-2024-29368
Updated: 2024-08-02T01:10:54.941Z
Status : Analyzed
Published: 2024-04-22T21:15:49.043
Modified: 2025-04-30T16:45:39.453
Link: CVE-2024-29368
No data.
OpenCVE Enrichment
No data.