First published: Thu Feb 08 2024(Updated: )
An arbitrary File upload vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions at com.java2nb.system.controller.SysUserController: uploadImg(). An attacker can pass in specially crafted filename parameter to perform arbitrary File download.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xxyopen Novel | <=4.2.0 | |
xxyopen Novel | =4.3.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24026 is classified as a high severity vulnerability due to its potential for arbitrary file upload and download.
To fix CVE-2024-24026, update the Novel-Plus application to version 4.3.0-RC2 or later.
CVE-2024-24026 affects Novel-Plus versions 4.3.0-RC1 and all versions prior to 4.2.0.
An attacker exploiting CVE-2024-24026 can perform arbitrary file uploads and potentially execute further attacks by manipulating the filename parameter.
Mitigation for CVE-2024-24026 without upgrading involves implementing strict validation on file uploads and restricting file types and sizes.