A vulnerability classified as critical was found in DedeBIZ 6.3.0. This vulnerability affects the function get_mime_type of the file /admin/dialog/select_images_post.php of the component Attachment Settings. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-48747 A vulnerability classified as critical was found in DedeBIZ 6.3.0. This vulnerability affects the function get_mime_type of the file /admin/dialog/select_images_post.php of the component Attachment Settings. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 28 Sep 2024 03:15:00 +0900

Type Values Removed Values Added
First Time appeared Dedebiz
Dedebiz dedebiz
CPEs cpe:2.3:a:dedebiz:dedebiz:6.3.0:*:*:*:*:*:*:*
Vendors & Products Dedebiz
Dedebiz dedebiz

Wed, 21 Aug 2024 05:30:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 18 Aug 2024 22:45:00 +0900

Type Values Removed Values Added
Description A vulnerability classified as critical was found in DedeBIZ 6.3.0. This vulnerability affects the function get_mime_type of the file /admin/dialog/select_images_post.php of the component Attachment Settings. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Title DedeBIZ Attachment Settings select_images_post.php get_mime_type unrestricted upload
Weaknesses CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-08-20T19:54:36.347Z

Reserved: 2024-08-17T17:05:51.194Z

Link: CVE-2024-7906

cve-icon Vulnrichment

Updated: 2024-08-20T19:54:32.680Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-18T14:15:09.593

Modified: 2024-09-27T17:54:51.877

Link: CVE-2024-7906

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses