CVE-2024-29409

File Upload vulnerability in nestjs nest v.10.3.2 allows a remote attacker to execute arbitrary code via the Content-Type header.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:nestjs:nest:10.3.2:*:*:*:*:node.js:*:*

History

03 Apr 2025, 15:30

Type Values Removed Values Added
CPE cpe:2.3:a:nestjs:nest:10.3.2:*:*:*:*:node.js:*:*
First Time Nestjs nest
Nestjs
References () https://gist.github.com/aydinnyunus/801342361584d1491c67a820a714f53f - () https://gist.github.com/aydinnyunus/801342361584d1491c67a820a714f53f - Exploit, Mitigation, Third Party Advisory
References () https://github.com/nestjs/nest/issues/13311#issuecomment-1993839495 - () https://github.com/nestjs/nest/issues/13311#issuecomment-1993839495 - Exploit, Issue Tracking

17 Mar 2025, 19:15

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) Vulnerabilidad de carga de archivos en nestjs nest v.10.3.2 permite a un atacante remoto ejecutar código arbitrario a través del encabezado Content-Type.

14 Mar 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-14 18:15

Updated : 2025-04-03 15:30


NVD link : CVE-2024-29409

Mitre link : CVE-2024-29409

CVE.ORG link : CVE-2024-29409


JSON object : View

Products Affected

nestjs

  • nest
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')