An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.znuny.org/en/advisories/zsa-2024-01 |
|
| https://znuny.com |
|
History
Tue, 02 Sep 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:znuny:znuny:*:*:*:*:-:*:*:* cpe:2.3:a:znuny:znuny:*:*:*:*:lts:*:*:* |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T02:13:39.090Z
Reserved: 2024-04-15T00:00:00
Link: CVE-2024-32491
Updated: 2024-08-02T02:13:39.090Z
Status : Analyzed
Published: 2024-04-29T17:15:19.183
Modified: 2025-09-02T21:21:38.100
Link: CVE-2024-32491
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:09:57Z
Weaknesses