Phpgurukul Tourism Management System v2.0 is vulnerable to Unrestricted Upload of File with Dangerous Type via tms/admin/create-package.php. When creating a new package, there is no checks for what types of files are uploaded from the image.
References
| Link | Resource |
|---|---|
| https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md | Broken Link Exploit Third Party Advisory |
| https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md | Broken Link Exploit Third Party Advisory |
Configurations
History
02 Apr 2025, 14:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md - Broken Link, Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:phpgurukul:tourism_management_system:2.0:*:*:*:*:*:*:* | |
| First Time |
Phpgurukul tourism Management System
Phpgurukul |
Information
Published : 2024-04-16 17:15
Updated : 2025-04-02 14:58
NVD link : CVE-2024-32254
Mitre link : CVE-2024-32254
CVE.ORG link : CVE-2024-32254
JSON object : View
Products Affected
phpgurukul
- tourism_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
