Vulnerability Description
Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jqueryform | Jqueryform | < 2022-02-05 |
Related Weaknesses (CWE)
References
- https://JQueryForm.comVendor Advisory
- https://gist.github.com/pb-nsi/4d0a1ede76d4e97083b3435f820bf560Third Party Advisory
- https://www.nou-systems.com/cyber-securityThird Party Advisory
- https://JQueryForm.comVendor Advisory
- https://gist.github.com/pb-nsi/4d0a1ede76d4e97083b3435f820bf560Third Party Advisory
- https://www.nou-systems.com/cyber-securityThird Party Advisory
FAQ
What is CVE-2022-24984?
CVE-2022-24984 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occ...
How severe is CVE-2022-24984?
CVE-2022-24984 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-24984?
Check the references section above for vendor advisories and patch information. Affected products include: Jqueryform Jqueryform.