A vulnerability, which was classified as critical, was found in TemmokuMVC up to 2.3. Affected is the function get_img_url/img_replace in the library lib/images_get_down.php of the component Image Download Handler. The manipulation leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254532. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
                
            References
                    | Link | Resource | 
|---|---|
| https://note.zhaoj.in/share/OrBH8zLKUPOA | Broken Link | 
| https://vuldb.com/?ctiid.254532 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?id.254532 | Third Party Advisory | 
| https://note.zhaoj.in/share/OrBH8zLKUPOA | Broken Link | 
| https://vuldb.com/?ctiid.254532 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?id.254532 | Third Party Advisory | 
Configurations
                    History
                    31 Dec 2024, 15:08
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Temmokumvc temmokumvc Temmokumvc | |
| References | () https://note.zhaoj.in/share/OrBH8zLKUPOA - Broken Link | |
| References | () https://vuldb.com/?ctiid.254532 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?id.254532 - Third Party Advisory | |
| CPE | cpe:2.3:a:temmokumvc:temmokumvc:*:*:*:*:*:*:*:* | 
Information
                Published : 2024-02-22 20:15
Updated : 2024-12-31 15:08
NVD link : CVE-2024-1750
Mitre link : CVE-2024-1750
CVE.ORG link : CVE-2024-1750
JSON object : View
Products Affected
                temmokumvc
- temmokumvc
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
