Roothub v2.5 was discovered to contain an arbitrary file upload vulnerability via the customPath parameter in the upload() function. This vulnerability allows attackers to execute arbitrary code via a crafted JSP file.
References
Link | Resource |
---|---|
http://roothub.com | Not Applicable |
https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33120.txt | Third Party Advisory |
http://roothub.com | Not Applicable |
https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33120.txt | Third Party Advisory |
Configurations
History
01 May 2025, 14:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:roothub:roothub:2.5.0:*:*:*:*:*:*:* | |
References | () http://roothub.com - Not Applicable | |
References | () https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33120.txt - Third Party Advisory | |
First Time |
Roothub
Roothub roothub |
Information
Published : 2024-05-07 15:15
Updated : 2025-05-01 14:55
NVD link : CVE-2024-33120
Mitre link : CVE-2024-33120
CVE.ORG link : CVE-2024-33120
JSON object : View
Products Affected
roothub
- roothub
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type