CVE-2024-1115

A vulnerability was found in openBI up to 1.0.8 and classified as critical. This issue affects the function dlfile of the file /application/websocket/controller/Setting.php. The manipulation of the argument phpPath leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252473 was assigned to this vulnerability.
References
Link Resource
https://note.zhaoj.in/share/81JmiyogcYL7 Broken Link Third Party Advisory
https://vuldb.com/?ctiid.252473 Permissions Required Third Party Advisory
https://vuldb.com/?id.252473 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbi:openbi:*:*:*:*:*:*:*:*

History

03 Feb 2024, 00:39

Type Values Removed Values Added
CPE cpe:2.3:a:openbi:openbi:*:*:*:*:*:*:*:*
References () https://note.zhaoj.in/share/81JmiyogcYL7 - () https://note.zhaoj.in/share/81JmiyogcYL7 - Broken Link, Third Party Advisory
References () https://vuldb.com/?ctiid.252473 - () https://vuldb.com/?ctiid.252473 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.252473 - () https://vuldb.com/?id.252473 - Third Party Advisory
CVSS v2 : 7.5
v3 : 7.3
v2 : 7.5
v3 : 9.8
First Time Openbi
Openbi openbi
Summary
  • (es) Se encontró una vulnerabilidad en openBI hasta 1.0.8. Ha sido clasificada como crítica. La función index del archivo /application/plugins/controller/Upload.php es afectada por esta vulnerabilidad. La manipulación conduce a una carga sin restricciones. Es posible lanzar el ataque de forma remota. La explotación ha sido divulgada al público y puede utilizarse. VDB-252474 es el identificador asignado a esta vulnerabilidad.

31 Jan 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-31 20:15

Updated : 2024-04-11 01:24


NVD link : CVE-2024-1115

Mitre link : CVE-2024-1115

CVE.ORG link : CVE-2024-1115


JSON object : View

Products Affected

openbi

  • openbi
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')