Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-52302
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
common-user-management Unrestricted File Upload Leading to Remote Code Execution (RCE)
Source: NVD (National Vulnerability Database)
Vulnerability Description
common-user-management is a robust Spring Boot application featuring user management services designed to control user access dynamically. There is a critical security vulnerability in the application endpoint /api/v1/customer/profile-picture. This endpoint allows file uploads without proper validation or restrictions, enabling attackers to upload malicious files that can lead to Remote Code Execution (RCE).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
危险类型文件的不加限制上传
Source: NVD (National Vulnerability Database)
Vulnerability Title
Java-springboot-codebase 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Java-springboot-codebase是osama个人开发者的一个 Java 和 Spring Boot 代码片段、应用程序和项目的集合。 Java-springboot-codebase存在代码问题漏洞,该漏洞源于允许在未经适当验证或限制的情况下上传文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
OsamaTaherJava-springboot-codebase < 204402bb8b68030c14911379ddc82cfff00b8538 -
II. Public POCs for CVE-2024-52302
#POC DescriptionSource LinkShenlong Link
1common-user-management is a robust Spring Boot application featuring user management services designed to control user access dynamically. There is a critical security vulnerability in the application endpoint /api/v1/customer/profile-picture. This endpoint allows file uploads without proper validation or restrictions leads to (RCE)https://github.com/d3sca/CVE-2024-52302POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-52302
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-52302

No comments yet


Leave a comment