First published: Thu Aug 22 2024(Updated: )
JPress through 5.1.1 on Windows has an arbitrary file upload vulnerability that could cause arbitrary code execution via ::$DATA to AttachmentController, such as a .jsp::$DATA file to io.jpress.web.commons.controller.AttachmentController#upload. NOTE: this is unrelated to the attack vector for CVE-2024-32358.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openMairie Openpresse | <=5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43033 is considered a high-severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-43033, upgrade JPress to version 5.1.2 or later to mitigate the vulnerability.
CVE-2024-43033 affects JPress versions up to and including 5.1.1 on Windows.
CVE-2024-43033 is classified as an arbitrary file upload vulnerability.
Yes, exploitation of CVE-2024-43033 could potentially lead to data breaches through arbitrary code execution.