Vulnerability Description
An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Znuny | Znuny | >= 6.0.31, <= 6.5.7 |
Related Weaknesses (CWE)
References
- https://www.znuny.org/en/advisories/zsa-2024-01Vendor Advisory
- https://znuny.comProduct
- https://www.znuny.org/en/advisories/zsa-2024-01Vendor Advisory
- https://znuny.comProduct
FAQ
What is CVE-2024-32491?
CVE-2024-32491 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable lo...
How severe is CVE-2024-32491?
CVE-2024-32491 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-32491?
Check the references section above for vendor advisories and patch information. Affected products include: Znuny Znuny.