
CVE-2024-1035 – openBI Icon.php uploadIcon unrestricted upload
https://notcve.org/view.php?id=CVE-2024-1035
30 Jan 2024 — A vulnerability has been found in openBI up to 1.0.8 and classified as critical. This vulnerability affects the function uploadIcon of the file /application/index/controller/Icon.php. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/AIbnbytIW9Bq • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2024-1034 – openBI File.php uploadFile unrestricted upload
https://notcve.org/view.php?id=CVE-2024-1034
30 Jan 2024 — A vulnerability, which was classified as critical, was found in openBI up to 1.0.8. This affects the function uploadFile of the file /application/index/controller/File.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/ABYkFE4wRPW5 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2024-1033 – openBI Datament.php agent information disclosure
https://notcve.org/view.php?id=CVE-2024-1033
30 Jan 2024 — A vulnerability, which was classified as problematic, has been found in openBI up to 1.0.8. Affected by this issue is the function agent of the file /application/index/controller/Datament.php. The manipulation of the argument api leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/nD654ot6zRQZ • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-1032 – openBI Test Connection Databasesource.php testConnection deserialization
https://notcve.org/view.php?id=CVE-2024-1032
30 Jan 2024 — A vulnerability classified as critical was found in openBI up to 1.0.8. Affected by this vulnerability is the function testConnection of the file /application/index/controller/Databasesource.php of the component Test Connection Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/6ISYe2urjlkI • CWE-502: Deserialization of Untrusted Data •