A vulnerability was found in Weaver E-cology allows attackers use race conditions to bypass security mechanisms to upload malicious files and control server privileges
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 05 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:weaver:e-cology:9.0:*:*:*:*:*:*:*

Thu, 21 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Weaver
Weaver e-cology
Weaknesses CWE-362
CPEs cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
Vendors & Products Weaver
Weaver e-cology
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
Description A remote code execution (RCE) vulnerability in the component /inventory/doCptimpoptInventory of Weaver Ecology v9.* allows attackers to execute arbitrary code via injecting a crafted payload into the name of an uploaded file. A vulnerability was found in Weaver E-cology allows attackers use race conditions to bypass security mechanisms to upload malicious files and control server privileges

Tue, 19 Nov 2024 17:45:00 +0000

Type Values Removed Values Added
Description A remote code execution (RCE) vulnerability in the component /inventory/doCptimpoptInventory of Weaver Ecology v9.* allows attackers to execute arbitrary code via injecting a crafted payload into the name of an uploaded file.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-11-21T16:32:21.047Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48069

cve-icon Vulnrichment

Updated: 2024-11-21T16:28:11.478Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-19T18:15:21.257

Modified: 2025-06-05T13:54:55.510

Link: CVE-2024-48069

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.