8.9
CWE
77 502 434
Advisory Published
Updated

CVE-2024-24551: Bludit - Remote Code Execution (RCE) through Image API

First published: Mon Jun 24 2024(Updated: )

A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.

Credit: vulnerability@ncsc.ch

Affected SoftwareAffected VersionHow to fix
Bludit

Remedy

1. Remove tmp-folder from webroot: Ensure that the temporary file directory is relocated outside of the web root to prevent unauthorized access. 2. Remove files from tmp folder even on negative checks: Implement a cleanup process to remove files from the temporary folder, regardless of whether the file extension check is positive or negative. 3. Consolidate image upload code for AJAX requests: It should be noted that there is code for handling image uploads over AJAX (and not through the API) under `bl-kernel/ajax/profile-picture-upload.php`. This code is similar, but different to the API image upload code. For instance, the AJAX code for image uploads includes MIME type validation to provide an additional layer of security. It is advised to consolidate the code into a single location for easier maintenance and ensuring that it is consistent across different parts of the application.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-24551?

    CVE-2024-24551 is considered a high severity vulnerability due to the potential for authenticated attackers to execute arbitrary code.

  • How do I fix CVE-2024-24551?

    To fix CVE-2024-24551, update Bludit to the latest version that addresses the file upload handling issue.

  • Who is affected by CVE-2024-24551?

    CVE-2024-24551 affects installations of Bludit that allow file uploads via the Image API.

  • What can attackers do with CVE-2024-24551?

    Attackers can upload and execute malicious PHP files on the server due to improper file handling in Bludit's Image API.

  • Is there a workaround for CVE-2024-24551?

    A temporary workaround for CVE-2024-24551 includes disabling file uploads until the software is updated.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203