CVE-2024-9985

Enterprise Cloud Database from Ragic does not properly validate the file type for uploads. Attackers with regular privileges can upload a webshell and use it to execute arbitrary code on the remote server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ragic:enterprise_cloud_database:*:*:*:*:*:*:*:*

History

16 Oct 2024, 22:02

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 10.0
v2 : unknown
v3 : 9.8
References () https://www.twcert.org.tw/en/cp-139-8153-1120e-2.html - () https://www.twcert.org.tw/en/cp-139-8153-1120e-2.html - Third Party Advisory
References () https://www.twcert.org.tw/tw/cp-132-8152-09e81-1.html - () https://www.twcert.org.tw/tw/cp-132-8152-09e81-1.html - Third Party Advisory
First Time Ragic enterprise Cloud Database
Ragic
CPE cpe:2.3:a:ragic:enterprise_cloud_database:*:*:*:*:*:*:*:*

15 Oct 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Enterprise Cloud Database de Ragic no valida correctamente el tipo de archivo para las cargas. Los atacantes con privilegios normales pueden cargar un webshell y usarlo para ejecutar código arbitrario en el servidor remoto.

15 Oct 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 09:15

Updated : 2024-10-16 22:02


NVD link : CVE-2024-9985

Mitre link : CVE-2024-9985

CVE.ORG link : CVE-2024-9985


JSON object : View

Products Affected

ragic

  • enterprise_cloud_database
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type