Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Unlimited flaws of PHP Voyager leave servers open
Global Security

Unlimited flaws of PHP Voyager leave servers open

AdminBy AdminJanuary 30, 2025No Comments2 Mins Read
Unpatched PHP Voyager Flaws
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 30, 2025Red LakshmananWeb -safety / vulnerability

PHP Voyager

In the PHP packet with open source were open three disadvantages Voyager This can be used by an attacker to achieve the remote code in one click in the affected specimens.

“If an authentified Voyager user clicks on a malicious link, attackers can execute an arbitrary code on the server,” – Researcher Sonar Yaniv Nizry – Note in a record published earlier this week.

Cybersecurity

Defined issues that remain unauthorized to date, despite the responsible disclosure of September 11, 2024, shown below – below –

  • CVE-2024-55417-CONTACT FILE VILY IN “/Administrator/Mass Media”/Download “final point
  • CVE-2024-55416-adjusted vulnerability
  • CE-2024-55415-CONTACT FILE LEABLE AND VOLATION OF Removal

Handmiky attacker can use the Voyager Media Download feature to download the malicious file in a way that bypasses the MIME type check and use A Polyglot -fail This is expressed as an image or video but contains the executed PHP code to cheat the server in processing it as a PHP scenario, leading to the remote code.

https://www.youtube.com/watch?v=qlcrpcxececcececececececececececece

The vulnerability can also be chained to the CVE-2024-55416, exalting it into a critical threat that leads to the code when the victim presses the malicious connection.

Cybersecurity

“This means that if the authentified user clicks on a specially created link, you can execute an arbitrary JavaScript code,” Nizhny explained. “As a result, the attacker can take any subsequent actions in the context of the victim.”

The CVE-2024-55415, on the other hand, applies to the deficiency in the file control system, allowing the subject threat to destroy arbitrary files or use it in conjunction with the XSS vulnerability to get the content of the files.

In the absence of fixing users, it is recommended to exercise care when using the project in their apps.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.