First published: Thu Feb 22 2024(Updated: )
Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer. This issue affects Apache Answer through 1.2.1. Pixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user can cause such an attack by uploading an image when posting content. Users are recommended to upgrade to version 1.2.5, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/apache/incubator-answer | <1.2.5 | 1.2.5 |
Apache Answer | <1.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22393 is categorized as a critical vulnerability due to its potential for creating an out-of-memory condition on affected servers.
To fix CVE-2024-22393, update Apache Answer to version 1.2.5 or later.
CVE-2024-22393 affects Apache Answer versions prior to 1.2.1.
CVE-2024-22393 is exploited by uploading large pixel files, which can overwhelm server memory.
Any logged-in user can exploit CVE-2024-22393 by uploading an image to the affected Apache Answer server.