Description
Unrestricted file upload vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to send a POST request to the endpoint '/opengnsys/images/M_Icons.php' modifying the file extension, due to lack of file extension verification, resulting in a webshell injection.
No analysis available yet.
Remediation
Vendor Solution
The OpenGnsys development team has released a security patch that resolves the reported vulnerabilities. These fixes will be included in the next version to be released shortly.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32280 | Unrestricted file upload vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to send a POST request to the endpoint '/opengnsys/images/M_Icons.php' modifying the file extension, due to lack of file extension verification, resulting in a webshell injection. |
References
History
Tue, 04 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opengnsys
Opengnsys opengnsys |
|
| CPEs | cpe:2.3:a:opengnsys:opengnsys:1.1.1d:*:*:*:*:*:*:* | |
| Vendors & Products |
Opengnsys
Opengnsys opengnsys |
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-08-09T15:40:20.140Z
Reserved: 2024-04-12T10:44:53.474Z
Link: CVE-2024-3705
Updated: 2024-08-01T20:20:00.910Z
Status : Analyzed
Published: 2024-04-12T14:15:08.957
Modified: 2025-11-04T18:23:26.043
Link: CVE-2024-3705
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD