CVE-2024-1036 – openBI Icon Screen.php uploadIcon unrestricted upload
https://notcve.org/view.php?id=CVE-2024-1036
A vulnerability was found in openBI up to 1.0.8 and classified as critical. This issue affects the function uploadIcon of the file /application/index/controller/Screen.php of the component Icon Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/X1ASzPP5rHel https://vuldb.com/?ctiid.252311 https://vuldb.com/?id.252311 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2024-1035 – openBI Icon.php uploadIcon unrestricted upload
https://notcve.org/view.php?id=CVE-2024-1035
A vulnerability has been found in openBI up to 1.0.8 and classified as critical. This vulnerability affects the function uploadIcon of the file /application/index/controller/Icon.php. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/AIbnbytIW9Bq https://vuldb.com/?ctiid.252310 https://vuldb.com/?id.252310 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2024-1034 – openBI File.php uploadFile unrestricted upload
https://notcve.org/view.php?id=CVE-2024-1034
A vulnerability, which was classified as critical, was found in openBI up to 1.0.8. This affects the function uploadFile of the file /application/index/controller/File.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/ABYkFE4wRPW5 https://vuldb.com/?ctiid.252309 https://vuldb.com/?id.252309 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2024-1033 – openBI Datament.php agent information disclosure
https://notcve.org/view.php?id=CVE-2024-1033
A vulnerability, which was classified as problematic, has been found in openBI up to 1.0.8. Affected by this issue is the function agent of the file /application/index/controller/Datament.php. The manipulation of the argument api leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/nD654ot6zRQZ https://vuldb.com/?ctiid.252308 https://vuldb.com/?id.252308 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-1032 – openBI Test Connection Databasesource.php testConnection deserialization
https://notcve.org/view.php?id=CVE-2024-1032
A vulnerability classified as critical was found in openBI up to 1.0.8. Affected by this vulnerability is the function testConnection of the file /application/index/controller/Databasesource.php of the component Test Connection Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/6ISYe2urjlkI https://vuldb.com/?ctiid.252307 https://vuldb.com/?id.252307 • CWE-502: Deserialization of Untrusted Data •