JPress through 5.1.1 on Windows has an arbitrary file upload vulnerability that could cause arbitrary code execution via ::$DATA to AttachmentController, such as a .jsp::$DATA file to io.jpress.web.commons.controller.AttachmentController#upload. NOTE: this is unrelated to the attack vector for CVE-2024-32358.
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/69.html | Not Applicable |
https://github.com/JPressProjects/jpress/issues/188 | Exploit Issue Tracking Vendor Advisory |
https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
03 Jun 2025, 14:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft
Microsoft windows Jpress Jpress jpress |
|
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:* |
|
References | () https://cwe.mitre.org/data/definitions/69.html - Not Applicable | |
References | () https://github.com/JPressProjects/jpress/issues/188 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033 - Exploit, Third Party Advisory |
22 Aug 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-69 |
22 Aug 2024, 12:48
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Aug 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-22 01:15
Updated : 2025-06-03 14:25
NVD link : CVE-2024-43033
Mitre link : CVE-2024-43033
CVE.ORG link : CVE-2024-43033
JSON object : View
Products Affected
jpress
- jpress
microsoft
- windows
CWE
CWE-69
Improper Handling of Windows ::DATA Alternate Data Stream