{"vulnerability": "CVE-2024-9855", "sightings": [{"uuid": "60280dec-8d12-425c-b8e2-94f449fad2bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9855", "type": "seen", "source": "https://t.me/cvedetector/7658", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9855 - \"07FlyCMS/07FlyCRM/07FLY-CMS Path Traversal Unrestricted File Upload Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-9855 \nPublished : Oct. 11, 2024, 1:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability was found in 07FLYCMS, 07FLY-CMS and 07FlyCRM 1.3.8. It has been declared as critical. Affected by this vulnerability is the function uploadFile of the file /admin/SysModule/upload/ajaxmodel/upload/uploadfilepath/sysmodule_1 of the component Module Plug-In Handler. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The affected product is known with different names like 07FLYCMS, 07FLY-CMS, and 07FlyCRM. It was not possible to reach out to the vendor before assigning a CVE due to a not working mail address. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T16:10:26.000000Z"}]}