CVE-2024-38529

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-38529
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38529.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-38529
Aliases
Published
2024-07-29T15:15:10Z
Modified
2024-10-08T04:16:02.000128Z
Summary
[none]
Details

Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.3.10, there is a Remote Code Execution Vulnerability in the Message module of the Admidio Application, where it is possible to upload a PHP file in the attachment. The uploaded file can be accessed publicly through the URL {admidio_base_url}/adm_my_files/messages_attachments/{file_name}. The vulnerability is caused due to the lack of file extension verification, allowing malicious files to be uploaded to the server and public availability of the uploaded file. This vulnerability is fixed in 4.3.10.

References

Affected packages

Git / github.com/admidio/admidio

Affected ranges

Type
GIT
Repo
https://github.com/admidio/admidio
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

3.*

3.0-Beta.1
3.0-Beta.2
3.0-Beta.3
3.0-Beta.4
3.0.0

v3.*

v3.0.1
v3.0.2
v3.0.3
v3.0.4
v3.0.6
v3.1-Beta.1
v3.1-Beta.2
v3.1-Beta.3
v3.1.0
v3.1.1
v3.1.2
v3.1.3
v3.1.4
v3.1.5
v3.1.6
v3.1.7
v3.1.8
v3.1.9
v3.2-Beta.1
v3.2-Beta.2
v3.2-Beta.3
v3.2.0
v3.2.1
v3.2.10
v3.2.11
v3.2.12
v3.2.13
v3.2.14
v3.2.15
v3.2.2
v3.2.3
v3.2.4
v3.2.5
v3.2.5.1
v3.2.6
v3.2.7
v3.2.8
v3.2.9
v3.3-Beta.1
v3.3-Beta.2
v3.3-Beta.3
v3.3-Beta.4
v3.3.0
v3.3.1
v3.3.10
v3.3.11
v3.3.12
v3.3.13
v3.3.14
v3.3.15
v3.3.16
v3.3.17
v3.3.2
v3.3.3
v3.3.4
v3.3.5
v3.3.6
v3.3.7
v3.3.8
v3.3.9

v4.*

v4.0-Beta.1
v4.0-Beta.2
v4.0-Beta.3
v4.0-Beta.4
v4.0-Beta.5
v4.0.0
v4.0.1
v4.0.1.1
v4.0.10
v4.0.11
v4.0.2
v4.0.3
v4.0.4
v4.0.5
v4.0.6
v4.0.7
v4.0.8
v4.0.9
v4.1-Beta.1
v4.1-Beta.2
v4.3-Beta.1
v4.3-Beta.3
v4.3-Beta.4
v4.3-Beta.5
v4.3.0
v4.3.1
v4.3.2
v4.3.3
v4.3.4
v4.3.5
v4.3.6
v4.3.7
v4.3.8
v4.3.9