In the PHP packet with open source were open three disadvantages Voyager This can be used by an attacker to achieve the remote code in one click in the affected specimens.
“If an authentified Voyager user clicks on a malicious link, attackers can execute an arbitrary code on the server,” – Researcher Sonar Yaniv Nizry – Note in a record published earlier this week.
Defined issues that remain unauthorized to date, despite the responsible disclosure of September 11, 2024, shown below – below –
- CVE-2024-55417-CONTACT FILE VILY IN “/Administrator/Mass Media”/Download “final point
- CVE-2024-55416-adjusted vulnerability
- CE-2024-55415-CONTACT FILE LEABLE AND VOLATION OF Removal
Handmiky attacker can use the Voyager Media Download feature to download the malicious file in a way that bypasses the MIME type check and use A Polyglot -fail This is expressed as an image or video but contains the executed PHP code to cheat the server in processing it as a PHP scenario, leading to the remote code.
https://www.youtube.com/watch?v=qlcrpcxececcececececececececececece
The vulnerability can also be chained to the CVE-2024-55416, exalting it into a critical threat that leads to the code when the victim presses the malicious connection.
“This means that if the authentified user clicks on a specially created link, you can execute an arbitrary JavaScript code,” Nizhny explained. “As a result, the attacker can take any subsequent actions in the context of the victim.”
The CVE-2024-55415, on the other hand, applies to the deficiency in the file control system, allowing the subject threat to destroy arbitrary files or use it in conjunction with the XSS vulnerability to get the content of the files.
In the absence of fixing users, it is recommended to exercise care when using the project in their apps.