{"uuid": "d4ee3cc4-6ec5-43e1-8e29-ed24afae0232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10649", "type": "seen", "source": "https://t.me/cvedetector/17594", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10649 - Wandb OpenUI Unauthenticated File Upload/Download Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10649 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : wandb/openui latest commit c945bb859979659add5f490a874140ad17c56a5d contains a vulnerability where unauthenticated endpoints allow file uploads and downloads from an AWS S3 bucket. This can lead to multiple security issues including denial of service, stored XSS, and information disclosure. The affected endpoints are '/v1/share/{id:str}' for uploading and '/v1/share/{id:str}' for downloading JSON files. The lack of authentication allows any user to upload and overwrite files, potentially causing the S3 bucket to run out of space, injecting malicious scripts, and accessing sensitive information. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:42.000000Z"}