{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0185","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-01T15:37:14.422Z","datePublished":"2024-01-02T00:00:06.730Z","dateUpdated":"2024-11-14T19:32:42.564Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-01-02T00:00:06.730Z"},"title":"RRJ Nueva Ecija Engineer Online Portal Avatar dasboard_teacher.php unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"CWE-434 Unrestricted Upload"}]}],"affected":[{"vendor":"RRJ","product":"Nueva Ecija Engineer Online Portal","versions":[{"version":"1.0","status":"affected"}],"modules":["Avatar Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443."},{"lang":"de","value":"Eine Schwachstelle wurde in RRJ Nueva Ecija Engineer Online Portal 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei dasboard_teacher.php der Komponente Avatar Handler. Durch das Manipulieren mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-01-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-01T16:42:57.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ahmed8199 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.249443","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.249443","tags":["signature","permissions-required"]},{"url":"https://mega.nz/file/PBd13AoR#G3fYWB82wGCa7sD22JP3_twtbw3B0qSJ-4eMMrYR5cE","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T17:41:16.227Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.249443","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.249443","tags":["signature","permissions-required","x_transferred"]},{"url":"https://mega.nz/file/PBd13AoR#G3fYWB82wGCa7sD22JP3_twtbw3B0qSJ-4eMMrYR5cE","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-01-16T16:29:06.406078Z","id":"CVE-2024-0185","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-14T19:32:42.564Z"}}]}}