CVE-2024-11214

A vulnerability has been found in SourceCodester Best Employee Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/profile.php. The manipulation of the argument website_image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher disclosure contains confusing vulnerability classes.
References
Link Resource
https://github.com/sh3rl0ckpggp/0day/blob/main/Employee_management%20_system_RCE.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.284530 Permissions Required VDB Entry
https://vuldb.com/?id.284530 Third Party Advisory VDB Entry
https://vuldb.com/?submit.443304 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*

History

19 Nov 2024, 15:38

Type Values Removed Values Added
CPE cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*
First Time Mayurik
Mayurik best Employee Management System
References () https://github.com/sh3rl0ckpggp/0day/blob/main/Employee_management%20_system_RCE.md - () https://github.com/sh3rl0ckpggp/0day/blob/main/Employee_management%20_system_RCE.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.284530 - () https://vuldb.com/?ctiid.284530 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.284530 - () https://vuldb.com/?id.284530 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.443304 - () https://vuldb.com/?submit.443304 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product
CVSS v2 : 5.8
v3 : 4.7
v2 : 5.8
v3 : 7.2

15 Nov 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en SourceCodester Best Employee Management System 1.0 y se ha clasificado como crítica. Esta vulnerabilidad afecta al código desconocido del archivo /admin/profile.php. La manipulación del argumento website_image permite la carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al público y puede utilizarse. La divulgación inicial del investigador contiene clases de vulnerabilidad confusas.

14 Nov 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-14 16:15

Updated : 2024-11-19 15:38


NVD link : CVE-2024-11214

Mitre link : CVE-2024-11214

CVE.ORG link : CVE-2024-11214


JSON object : View

Products Affected

mayurik

  • best_employee_management_system
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type

CWE-284

Improper Access Control