Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.
Pixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user can cause such an attack by uploading an image when posting content.
Users are recommended to upgrade to version [1.2.5], which fixes the issue.
References
Configurations
No configuration.
History
21 Nov 2024, 08:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/02/22/1 - | |
References | () https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv - |
01 Aug 2024, 13:46
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
22 Feb 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-22 10:15
Updated : 2024-11-21 08:56
NVD link : CVE-2024-22393
Mitre link : CVE-2024-22393
CVE.ORG link : CVE-2024-22393
JSON object : View
Products Affected
No product.
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type