CVE-2024-43033

JPress through 5.1.1 on Windows has an arbitrary file upload vulnerability that could cause arbitrary code execution via ::$DATA to AttachmentController, such as a .jsp::$DATA file to io.jpress.web.commons.controller.AttachmentController#upload. NOTE: this is unrelated to the attack vector for CVE-2024-32358.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

03 Jun 2025, 14:25

Type Values Removed Values Added
References () https://cwe.mitre.org/data/definitions/69.html - () https://cwe.mitre.org/data/definitions/69.html - Not Applicable
References () https://github.com/JPressProjects/jpress/issues/188 - () https://github.com/JPressProjects/jpress/issues/188 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033 - () https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033 - Exploit, Third Party Advisory
First Time Microsoft
Microsoft windows
Jpress jpress
Jpress
CPE cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Information

Published : 2024-08-22 01:15

Updated : 2025-06-03 14:25


NVD link : CVE-2024-43033

Mitre link : CVE-2024-43033

CVE.ORG link : CVE-2024-43033


JSON object : View

Products Affected

jpress

  • jpress

microsoft

  • windows
CWE
CWE-69

Improper Handling of Windows ::DATA Alternate Data Stream