First published: Wed Aug 07 2024(Updated: )
Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability.
Credit: bbf0bd87-ece2-41be-b873-96928ee8fab9
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
OpenWrt libuci | =0.1.105 | |
Debian | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6707 is classified as a high severity vulnerability due to its potential for remote file uploads leading to arbitrary code execution.
To mitigate CVE-2024-6707, ensure that input validation is implemented to prevent path traversal and restrict file upload locations.
CVE-2024-6707 specifically affects OpenWebUI version 0.1.105.
The risks of CVE-2024-6707 include unauthorized access to the server and the ability to upload malicious files that could compromise the system.
As of now, there is no public confirmation of active exploitation of CVE-2024-6707, but it is crucial to remain vigilant.