Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29272

EPSS 89.40% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-29272

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
VvvebJs 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VvvebJs是Givan个人开发者的一个拖放网站生成器。 VvvebJs 1.7.7之前版本存在安全漏洞,该漏洞源于存在任意文件上传漏洞,允许未经身份验证的远程攻击者通过save.php中的sanitizeFileName参数执行任意代码并获取敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-29272

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/awjkjflkwlekfdjs/CVE-2024-29272POC Details
2Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-29272.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-29272

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-03-22 · 22 CVEs total

CVE-2024-28224.3 MEDIUMDedeCMS vote_edit.php cross-site request forgery
CVE-2024-28214.3 MEDIUMDedeCMS friendlink_edit.php cross-site request forgery
CVE-2024-28204.3 MEDIUMDedeCMS baidunews.php cross-site request forgery
CVE-2024-28234.3 MEDIUMDedeCMS mda_main.php cross-site request forgery
CVE-2024-29385D-Link DIR-845L 安全漏洞
CVE-2024-29499Anchor 安全漏洞
CVE-2024-29366D-Link DIR-845L 安全漏洞
CVE-2024-29338Anchor 安全漏洞
CVE-2024-29865Logpoint 安全漏洞
CVE-2024-28593Moodle 安全漏洞
CVE-2023-41099Atos CardOS API 安全漏洞
CVE-2024-28560Niushop B2B2C 安全漏洞
CVE-2024-28559Niushop B2B2C 安全漏洞
CVE-2024-25168DingFlow 安全漏洞
CVE-2024-29275SeaCMS 安全漏洞
CVE-2024-29273DzzOffice 安全漏洞
CVE-2024-29271VvvebJs 安全漏洞
CVE-2024-26557Codiad 安全漏洞
CVE-2024-25808Lychee 安全漏洞
CVE-2024-28441magicflue 安全漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-29272

No comments yet


Leave a comment