CVE-2024-9981
FormosaSoft ee-class - Local File Inclusion
Severity Score
8.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
The ee-class from FormosaSoft does not properly validate a specific page parameter, allowing remote attackers with regular privileges to upload a malicious PHP file first and then exploit this vulnerability to include the file, resulting in arbitrary code execution on the server.
La clase ee de FormosaSoft no valida correctamente un parámetro de página específico, lo que permite a atacantes remotos con privilegios regulares cargar primero un archivo PHP malicioso y luego explotar esta vulnerabilidad para incluir el archivo, lo que resulta en la ejecución de código arbitrario en el servidor.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-10-15 CVE Reserved
- 2024-10-15 CVE Published
- 2024-10-15 CVE Updated
- 2024-10-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CAPEC
- CAPEC-252: PHP Local File Inclusion
References (2)
URL | Tag | Source |
---|---|---|
https://www.twcert.org.tw/en/cp-139-8145-15bea-2.html | Third Party Advisory | |
https://www.twcert.org.tw/tw/cp-132-8144-2885b-1.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
- | - | - | - | - |