Description
A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38201 | A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server. |
References
| Link | Providers |
|---|---|
| https://www.veeam.com/kb4649 |
|
History
Mon, 09 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veeam
Veeam service Provider Console |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Veeam
Veeam service Provider Console |
|
| Metrics |
ssvc
|
Sat, 07 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server. | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-09T15:15:08.789Z
Reserved: 2024-06-28T01:04:08.821Z
Link: CVE-2024-39715
Updated: 2024-09-09T15:13:45.778Z
Status : Deferred
Published: 2024-09-07T17:15:12.663
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-39715
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD