JPress through 5.1.1 on Windows has an arbitrary file upload vulnerability that could cause arbitrary code execution via ::$DATA to AttachmentController, such as a .jsp::$DATA file to io.jpress.web.commons.controller.AttachmentController#upload. NOTE: this is unrelated to the attack vector for CVE-2024-32358.
The product does not properly prevent access to, or detect usage of, alternate data streams (ADS).
Link | Tags |
---|---|
https://github.com/JPressProjects/jpress/issues/188 | vendor advisory issue tracking exploit |
https://cwe.mitre.org/data/definitions/69.html | not applicable |
https://github.com/lazy-forever/CVE-Reference/tree/main/2024/43033 | exploit third party advisory |