CVE-2024-13201

A vulnerability has been found in wander-chu SpringBoot-Blog 1.0 and classified as critical. This vulnerability affects the function upload of the file src/main/java/com/my/blog/website/controller/admin/AttachtController.java of the component Admin Attachment Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/wander-chu/SpringBoot-Blog/issues/6 Exploit Issue Tracking
https://github.com/wander-chu/SpringBoot-Blog/issues/6#issue-2761640788 Exploit Issue Tracking
https://vuldb.com/?ctiid.290794 Permissions Required VDB Entry
https://vuldb.com/?id.290794 Third Party Advisory VDB Entry
https://vuldb.com/?submit.470910 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:wander-chu:springboot-blog:1.0:*:*:*:*:*:*:*

History

22 Aug 2025, 16:47

Type Values Removed Values Added
References () https://github.com/wander-chu/SpringBoot-Blog/issues/6 - () https://github.com/wander-chu/SpringBoot-Blog/issues/6 - Exploit, Issue Tracking
References () https://github.com/wander-chu/SpringBoot-Blog/issues/6#issue-2761640788 - () https://github.com/wander-chu/SpringBoot-Blog/issues/6#issue-2761640788 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.290794 - () https://vuldb.com/?ctiid.290794 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.290794 - () https://vuldb.com/?id.290794 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.470910 - () https://vuldb.com/?submit.470910 - Third Party Advisory, VDB Entry
First Time Wander-chu
Wander-chu springboot-blog
CPE cpe:2.3:a:wander-chu:springboot-blog:1.0:*:*:*:*:*:*:*
Summary
  • (es) Se ha encontrado una vulnerabilidad en wander-chu SpringBoot-Blog 1.0 y se ha clasificado como crítica. Esta vulnerabilidad afecta a la función de carga del archivo src/main/java/com/my/blog/website/controller/admin/AttachtController.java del componente Admin Attachment Handler. La manipulación del archivo de argumentos provoca una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al público y puede utilizarse. Se contactó al proveedor con anticipación sobre esta divulgación, pero no respondió de ninguna manera.

09 Jan 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-09 03:15

Updated : 2025-08-22 16:47


NVD link : CVE-2024-13201

Mitre link : CVE-2024-13201

CVE.ORG link : CVE-2024-13201


JSON object : View

Products Affected

wander-chu

  • springboot-blog
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type