Unrestricted file upload vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to send a POST request to the endpoint '/opengnsys/images/M_Icons.php' modifying the file extension, due to lack of file extension verification, resulting in a webshell injection.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32280 | Unrestricted file upload vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to send a POST request to the endpoint '/opengnsys/images/M_Icons.php' modifying the file extension, due to lack of file extension verification, resulting in a webshell injection. |
Fixes
Solution
The OpenGnsys development team has released a security patch that resolves the reported vulnerabilities. These fixes will be included in the next version to be released shortly.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opengnsys
Opengnsys opengnsys |
|
| CPEs | cpe:2.3:a:opengnsys:opengnsys:1.1.1d:*:*:*:*:*:*:* | |
| Vendors & Products |
Opengnsys
Opengnsys opengnsys |
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-08-09T15:40:20.140Z
Reserved: 2024-04-12T10:44:53.474Z
Link: CVE-2024-3705
Updated: 2024-08-01T20:20:00.910Z
Status : Analyzed
Published: 2024-04-12T14:15:08.957
Modified: 2025-11-04T18:23:26.043
Link: CVE-2024-3705
No data.
OpenCVE Enrichment
No data.
EUVD