An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.
References
Link | Resource |
---|---|
https://www.znuny.org/en/advisories/zsa-2024-01 | Vendor Advisory |
https://znuny.com | Product |
https://www.znuny.org/en/advisories/zsa-2024-01 | Vendor Advisory |
https://znuny.com | Product |
Configurations
Configuration 1 (hide)
|
History
02 Sep 2025, 21:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.znuny.org/en/advisories/zsa-2024-01 - Vendor Advisory | |
References | () https://znuny.com - Product | |
CPE | cpe:2.3:a:znuny:znuny:*:*:*:*:lts:*:*:* cpe:2.3:a:znuny:znuny:*:*:*:*:-:*:*:* |
|
First Time |
Znuny znuny
Znuny |
Information
Published : 2024-04-29 17:15
Updated : 2025-09-02 21:21
NVD link : CVE-2024-32491
Mitre link : CVE-2024-32491
CVE.ORG link : CVE-2024-32491
JSON object : View
Products Affected
znuny
- znuny
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')