First published: Mon Jun 24 2024(Updated: )
A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/ajax.php?action=save_settings. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269493 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Online Bidding System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6280 has been classified as critical.
To fix CVE-2024-6280, restrict the file upload settings in the /admin/ajax.php?action=save_settings file.
CVE-2024-6280 affects SourceCodester Simple Online Bidding System version 1.0.
CVE-2024-6280 allows for unrestricted file uploads due to improper handling of the img argument.
Yes, CVE-2024-6280 can open up the system to potential malicious uploads, leading to further security risks.