CVE-2024-6084

A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268825 was assigned to this vulnerability.
References
Link Resource
https://github.com/Laster-dev/CVE/issues/2 Exploit
https://vuldb.com/?ctiid.268825 Permissions Required Third Party Advisory
https://vuldb.com/?id.268825 Third Party Advisory
https://vuldb.com/?submit.358628 Third Party Advisory
https://github.com/Laster-dev/CVE/issues/2 Exploit
https://vuldb.com/?ctiid.268825 Permissions Required Third Party Advisory
https://vuldb.com/?id.268825 Third Party Advisory
https://vuldb.com/?submit.358628 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 09:48

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.3
References () https://github.com/Laster-dev/CVE/issues/2 - Exploit () https://github.com/Laster-dev/CVE/issues/2 - Exploit
References () https://vuldb.com/?ctiid.268825 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.268825 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.268825 - Third Party Advisory () https://vuldb.com/?id.268825 - Third Party Advisory
References () https://vuldb.com/?submit.358628 - Third Party Advisory () https://vuldb.com/?submit.358628 - Third Party Advisory

08 Aug 2024, 16:20

Type Values Removed Values Added
First Time Janobe
Janobe pool Of Bethesda Online Reservation System
CPE cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*
CVSS v2 : 7.5
v3 : 7.3
v2 : 7.5
v3 : 9.8
References () https://github.com/Laster-dev/CVE/issues/2 - () https://github.com/Laster-dev/CVE/issues/2 - Exploit
References () https://vuldb.com/?ctiid.268825 - () https://vuldb.com/?ctiid.268825 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.268825 - () https://vuldb.com/?id.268825 - Third Party Advisory
References () https://vuldb.com/?submit.358628 - () https://vuldb.com/?submit.358628 - Third Party Advisory

18 Jun 2024, 14:15

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en itsourcecode Pool of Bethesda Online Reservation System hasta 1.0 y clasificada como crítica. La función uploadImage del archivo /admin/mod_room/controller.php?action=add es afectada por esta vulnerabilidad. La manipulación de la imagen del argumento conduce a una carga sin restricciones. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-268825.

18 Jun 2024, 05:15

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 6.3
v2 : 7.5
v3 : 7.3

18 Jun 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-18 01:15

Updated : 2024-11-21 09:48


NVD link : CVE-2024-6084

Mitre link : CVE-2024-6084

CVE.ORG link : CVE-2024-6084


JSON object : View

Products Affected

janobe

  • pool_of_bethesda_online_reservation_system
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type