CVE-2024-32491

An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CISA-ADPADP
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 72%
VendorProductVersion
znunyznuny
6.0.31 ≤
𝑥
≤ 6.5.7
znunyznuny
7.0.1 ≤
𝑥
≤ 7.0.16
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
znuny
bookworm/non-free
vulnerable
trixie/non-free
6.5.15-2
fixed
bookworm
no-dsa
sid/non-free
6.5.16-1
fixed
forky/non-free
6.5.16-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
znuny
plucky
not-affected
oracular
not-affected
noble
needs-triage
mantic
ignored
jammy
dne
focal
dne