CVE-2024-6280

A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/ajax.php?action=save_settings. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269493 was assigned to this vulnerability.
References
Link Resource
https://github.com/Isfulou/cve/blob/main/upload.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.269493 Permissions Required
https://vuldb.com/?id.269493 Third Party Advisory VDB Entry
https://vuldb.com/?submit.363054 Third Party Advisory VDB Entry
https://github.com/Isfulou/cve/blob/main/upload.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.269493 Permissions Required
https://vuldb.com/?id.269493 Third Party Advisory VDB Entry
https://vuldb.com/?submit.363054 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_online_bidding_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-06-24 03:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6280

Mitre link : CVE-2024-6280

CVE.ORG link : CVE-2024-6280


JSON object : View

Products Affected

oretnom23

  • simple_online_bidding_system
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type