An arbitrary file upload vulnerability in the file handling module of moziloCMS v2.0 allows attackers to bypass extension restrictions via file renaming, potentially leading to unauthorized file execution or storage of malicious content.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/becpn/mozilocms |
|
History
Tue, 05 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mozilo
Mozilo mozilocms |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:mozilo:mozilocms:2.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Mozilo
Mozilo mozilocms |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2024-04-22T00:00:00
Updated: 2024-11-05T17:07:48.608Z
Reserved: 2024-03-19T00:00:00
Link: CVE-2024-29368
Updated: 2024-08-02T01:10:54.941Z
Status : Analyzed
Published: 2024-04-22T21:15:49.043
Modified: 2025-04-30T16:45:39.453
Link: CVE-2024-29368
No data.