CVE-2024-37295 (GCVE-0-2024-37295)

Vulnerability from cvelistv5 – Published: 2024-06-11 14:38 – Updated: 2024-08-02 03:50
VLAI?
Summary
Aimeos is an Open Source e-commerce framework for online shops. Starting in version 2024.01.1 and prior to version 2024.04.5, a user with administrative privileges can upload files that look like images but contain PHP code which can then be executed in the context of the web server. Version 2024.04.5 fixes the issue.
CWE
  • CWE-73 - External Control of File Name or Path
Assigner
References
Impacted products
Vendor Product Version
aimeos aimeos-core Affected: >= 2024.04.1, < 2024.04.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:aimeos:aimeos-core:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "aimeos-core",
            "vendor": "aimeos",
            "versions": [
              {
                "lessThan": "2024.04.5",
                "status": "affected",
                "version": "2024.01.1",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-37295",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-11T17:22:47.879934Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-11T17:22:52.398Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:50:56.094Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "aimeos-core",
          "vendor": "aimeos",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 2024.04.1, \u003c 2024.04.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Aimeos is an Open Source e-commerce framework for online shops. Starting in version 2024.01.1 and prior to version 2024.04.5, a user with administrative privileges can upload files that look like images but contain PHP code which can then be executed in the context of the web server. Version 2024.04.5 fixes the issue."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-73",
              "description": "CWE-73: External Control of File Name or Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-11T14:38:17.416Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c"
        }
      ],
      "source": {
        "advisory": "GHSA-rhc2-23c2-ww7c",
        "discovery": "UNKNOWN"
      },
      "title": "Aimeos Core remote code execution in web server context"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-37295",
    "datePublished": "2024-06-11T14:38:17.416Z",
    "dateReserved": "2024-06-05T20:10:46.496Z",
    "dateUpdated": "2024-08-02T03:50:56.094Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Aimeos is an Open Source e-commerce framework for online shops. Starting in version 2024.01.1 and prior to version 2024.04.5, a user with administrative privileges can upload files that look like images but contain PHP code which can then be executed in the context of the web server. Version 2024.04.5 fixes the issue.\"}, {\"lang\": \"es\", \"value\": \"Aimeos es un framework de comercio electr\\u00f3nico de c\\u00f3digo abierto para tiendas online. A partir de la versi\\u00f3n 2024.01.1 y antes de la versi\\u00f3n 2024.04.5, un usuario con privilegios administrativos puede cargar archivos que parecen im\\u00e1genes pero que contienen c\\u00f3digo PHP que luego se puede ejecutar en el contexto del servidor web. La versi\\u00f3n 2024.04.5 soluciona el problema.\"}]",
      "id": "CVE-2024-37295",
      "lastModified": "2024-11-21T09:23:33.247",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}]}",
      "published": "2024-06-11T15:16:09.710",
      "references": "[{\"url\": \"https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "security-advisories@github.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-73\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-37295\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-06-11T15:16:09.710\",\"lastModified\":\"2024-11-21T09:23:33.247\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Aimeos is an Open Source e-commerce framework for online shops. Starting in version 2024.01.1 and prior to version 2024.04.5, a user with administrative privileges can upload files that look like images but contain PHP code which can then be executed in the context of the web server. Version 2024.04.5 fixes the issue.\"},{\"lang\":\"es\",\"value\":\"Aimeos es un framework de comercio electr\u00f3nico de c\u00f3digo abierto para tiendas online. A partir de la versi\u00f3n 2024.01.1 y antes de la versi\u00f3n 2024.04.5, un usuario con privilegios administrativos puede cargar archivos que parecen im\u00e1genes pero que contienen c\u00f3digo PHP que luego se puede ejecutar en el contexto del servidor web. La versi\u00f3n 2024.04.5 soluciona el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-73\"}]}],\"references\":[{\"url\":\"https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"title\": \"Aimeos Core remote code execution in web server context\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-73\", \"lang\": \"en\", \"description\": \"CWE-73: External Control of File Name or Path\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c\"}], \"affected\": [{\"vendor\": \"aimeos\", \"product\": \"aimeos-core\", \"versions\": [{\"version\": \"\u003e= 2024.04.1, \u003c 2024.04.5\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-06-11T14:38:17.416Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Aimeos is an Open Source e-commerce framework for online shops. Starting in version 2024.01.1 and prior to version 2024.04.5, a user with administrative privileges can upload files that look like images but contain PHP code which can then be executed in the context of the web server. Version 2024.04.5 fixes the issue.\"}], \"source\": {\"advisory\": \"GHSA-rhc2-23c2-ww7c\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-37295\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-11T17:22:47.879934Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:aimeos:aimeos-core:*:*:*:*:*:*:*:*\"], \"vendor\": \"aimeos\", \"product\": \"aimeos-core\", \"versions\": [{\"status\": \"affected\", \"version\": \"2024.01.1\", \"lessThan\": \"2024.04.5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-11T17:22:29.388Z\"}}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-37295\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2024-06-05T20:10:46.496Z\", \"datePublished\": \"2024-06-11T14:38:17.416Z\", \"dateUpdated\": \"2024-06-11T17:22:52.398Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…