JPress through 5.1.1 on Windows has an arbitrary file upload vulnerability that could cause arbitrary code execution via ::$DATA to AttachmentController, such as a .jsp::$DATA file to io.jpress.web.commons.controller.AttachmentController#upload. NOTE: this is unrelated to the attack vector for CVE-2024-32358.
References
| Link | Resource |
|---|---|
| https://cwe.mitre.org/data/definitions/69.html | Not Applicable |
| https://github.com/JPressProjects/jpress/issues/188 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-08-22 01:15
Updated : 2025-06-03 14:25
NVD link : CVE-2024-43033
Mitre link : CVE-2024-43033
CVE.ORG link : CVE-2024-43033
JSON object : View
Products Affected
microsoft
- windows
jpress
- jpress
CWE
CWE-69
Improper Handling of Windows ::DATA Alternate Data Stream
