Unrestricted Upload Vulnerability in Taisan Tarzan-CMS
CVE-2024-13022

5.3MEDIUM

Key Information:

Vendor
Taisan
Status
Tarzan-cms
Vendor
CVE Published:
29 December 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A security vulnerability exists in Taisan Tarzan-CMS version 1.0.0 within the Article Management component. This issue arises within the UploadResponse function located in the UploadController.java file. Due to improper handling of file upload operations, attackers are able to manipulate upload arguments, leading to unauthorized and unrestricted file uploads. This vulnerability is particularly concerning as it can be exploited remotely, exposing systems to a range of potential attacks. The details of this exploit have been publicly disclosed, increasing its risk of exploitation in the wild, highlighting the importance of addressing this issue promptly.

Affected Version(s)

tarzan-cms 1.0.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

redpomelo (VulDB User)
.