A vulnerability was found in Weaver E-cology allows attackers use race conditions to bypass security mechanisms to upload malicious files and control server privileges
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Weaver
Weaver e-cology |
|
Weaknesses | CWE-362 | |
CPEs | cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:* | |
Vendors & Products |
Weaver
Weaver e-cology |
|
Metrics |
cvssV3_1
|
Wed, 20 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote code execution (RCE) vulnerability in the component /inventory/doCptimpoptInventory of Weaver Ecology v9.* allows attackers to execute arbitrary code via injecting a crafted payload into the name of an uploaded file. | A vulnerability was found in Weaver E-cology allows attackers use race conditions to bypass security mechanisms to upload malicious files and control server privileges |
Tue, 19 Nov 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote code execution (RCE) vulnerability in the component /inventory/doCptimpoptInventory of Weaver Ecology v9.* allows attackers to execute arbitrary code via injecting a crafted payload into the name of an uploaded file. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-11-19T00:00:00
Updated: 2024-11-21T16:32:21.047Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48069
Vulnrichment
Updated: 2024-11-21T16:28:11.478Z
NVD
Status : Awaiting Analysis
Published: 2024-11-19T18:15:21.257
Modified: 2024-11-21T17:15:18.473
Link: CVE-2024-48069
Redhat
No data.