CVE-2024-32491

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-32491
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32491.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-32491
Related
Published
2024-04-29T17:15:19Z
Modified
2024-09-18T03:26:15.758834Z
Summary
[none]
Details

An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.

References

Affected packages

Debian:12 / znuny

Package

Name
znuny
Purl
pkg:deb/debian/znuny?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.3.2-3
6.3.3-1~bpo11+1
6.3.3-1
6.3.4-1~bpo11+1
6.3.4-1
6.4.2-1~bpo11+1
6.4.2-1
6.4.2-2
6.4.3-1~bpo11+1
6.4.3-1
6.4.4-1
6.4.5-1~bpo11+1
6.4.5-1
6.4.5-2
6.5.1-1
6.5.3-1~bpo12+1
6.5.3-1
6.5.4-1~bpo12+1
6.5.4-1
6.5.5-1~bpo12+1
6.5.5-1
6.5.6-1~bpo12+1
6.5.6-1
6.5.8-1~bpo12+1
6.5.8-1
6.5.9-1~bpo12+1
6.5.9-1
6.5.10-1~bpo12+1
6.5.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / znuny

Package

Name
znuny
Purl
pkg:deb/debian/znuny?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.8-1

Affected versions

6.*

6.3.2-3
6.3.3-1~bpo11+1
6.3.3-1
6.3.4-1~bpo11+1
6.3.4-1
6.4.2-1~bpo11+1
6.4.2-1
6.4.2-2
6.4.3-1~bpo11+1
6.4.3-1
6.4.4-1
6.4.5-1~bpo11+1
6.4.5-1
6.4.5-2
6.5.1-1
6.5.3-1~bpo12+1
6.5.3-1
6.5.4-1~bpo12+1
6.5.4-1
6.5.5-1~bpo12+1
6.5.5-1
6.5.6-1~bpo12+1
6.5.6-1
6.5.8-1~bpo12+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}