Unrestricted Upload of File with Dangerous Type (CWE-434)
A problematic vulnerability has been discovered in Codezips Online Shopping Portal version 1.0. The vulnerability affects an unknown functionality in the file insert-product.php. By manipulating the arguments productimage1, productimage2, or productimage3, an attacker can perform an unrestricted upload attack. This vulnerability can be exploited remotely, and a public exploit is available.
This vulnerability allows for unrestricted file upload, which can have severe consequences. An attacker could potentially upload malicious files, leading to remote code execution, defacement of the website, or compromise of the server hosting the application. Given the CVSS v3.1 base score of 9.8 (Critical), the impact on confidentiality, integrity, and availability is considered HIGH. The attack vector is through the network, requires no user interaction, and can be executed without any privileges, making it particularly dangerous.
One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.
As of the latest information provided, there is no mention of an available patch for this vulnerability in Codezips Online Shopping Portal 1.0. Users of this software should be on high alert and consider alternative mitigation strategies until a patch is released.
Given the severity and the lack of a patch, immediate action is recommended: 1. Temporarily disable file upload functionality in the affected file (insert-product.php) if possible. 2. Implement strict file type and size restrictions on uploads. 3. Use a web application firewall (WAF) to filter potentially malicious uploads. 4. Monitor system logs for any suspicious upload activities. 5. Consider isolating the affected system to minimize potential damage. 6. Keep an eye out for any patches or updates from Codezips and apply them immediately when available. 7. If feasible, consider switching to a more secure alternative until this vulnerability is addressed.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-9038. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-9038
A CVSS base score of 4.3 has been assigned.
EPSS Score was set to: 0.05% (Percentile: 16.3%)
A CVSS base score of 9.8 has been assigned.