- What is the severity of CVE-2024-24551?
- CVE-2024-24551 has been scored as a high severity vulnerability.
- How to fix CVE-2024-24551?
- To fix CVE-2024-24551: 1. Remove tmp-folder from webroot: Ensure that the temporary file directory is relocated outside of the web root to prevent unauthorized access. 2. Remove files from tmp folder even on negative checks: Implement a cleanup process to remove files from the temporary folder, regardless of whether the file extension check is positive or negative. 3. Consolidate image upload code for AJAX requests: It should be noted that there is code for handling image uploads over AJAX (and not through the API) under `bl-kernel/ajax/profile-picture-upload.php`. This code is similar, but different to the API image upload code. For instance, the AJAX code for image uploads includes MIME type validation to provide an additional layer of security. It is advised to consolidate the code into a single location for easier maintenance and ensuring that it is consistent across different parts of the application.
- Is CVE-2024-24551 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2024-24551 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2024-24551?
- CVE-2024-24551 affects Bludit Bludit.