Description
A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
Published: 2024-09-07
Score: 8.5 High
EPSS: 3.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-38201 A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
References
History

Mon, 09 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Veeam
Veeam service Provider Console
Weaknesses CWE-94
CPEs cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:*
Vendors & Products Veeam
Veeam service Provider Console
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 07 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Description A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
References
Metrics cvssV3_0

{'score': 8.5, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Veeam Service Provider Console
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-09-09T15:15:08.789Z

Reserved: 2024-06-28T01:04:08.821Z

Link: CVE-2024-39715

cve-icon Vulnrichment

Updated: 2024-09-09T15:13:45.778Z

cve-icon NVD

Status : Deferred

Published: 2024-09-07T17:15:12.663

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-39715

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses