{"vulnerability": "cve-2024-13144", "sightings": [{"uuid": "d1bc41cd-3352-4d05-b7a1-63942dec08ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13144", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113778519374692503", "content": "", "creation_timestamp": "2025-01-06T00:13:49.251198Z"}, {"uuid": "223d7aac-8271-47fe-9ab7-bfd495954d54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13144", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lezu5gqkck25", "content": "", "creation_timestamp": "2025-01-06T00:15:32.518566Z"}, {"uuid": "29cf2444-d642-4581-a453-0bf9809e6173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13144", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lezwilq2fs2e", "content": "", "creation_timestamp": "2025-01-06T00:57:34.308363Z"}, {"uuid": "f7618f77-a7be-48e7-92f4-d927e2636dbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13144", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/147", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-8464-8v52-xm79\n\ud83d\udd17 Aliases: CVE-2024-13144\n\ud83d\udd39 Details: A vulnerability classified as critical has been found in zhenfeng13 My-Blog 1.0. Affected is the function uploadFileByEditomd of the file src/main/java/com/site/blog/my/core/controller/admin/BlogController.java. The manipulation of the argument editormd-image-file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L, CVSS_V4: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T00:30:41Z\n\ud83d\uddd3\ufe0f Published: 2025-01-06T00:30:41Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-284\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-13144\n2. https://github.com/ZHENFENG13/My-Blog/issues/140\n3. https://github.com/ZHENFENG13/My-Blog/issues/140#issue-259813820\n4. https://vuldb.com/?ctiid.290232\n5. https://vuldb.com/?id.290232\n6. https://vuldb.com/?submit.469220", "creation_timestamp": "2025-01-06T00:35:56.000000Z"}, {"uuid": "e378582f-7276-4305-a49d-8888d0079fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13144", "type": "seen", "source": "https://t.me/cvedetector/14320", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13144 - Zhenfeng13 My-Blog File Upload Vulnerability (Unrestricted File Upload)\", \n  \"Content\": \"CVE ID : CVE-2024-13144 \nPublished : Jan. 6, 2025, 12:15 a.m. | 28\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in zhenfeng13 My-Blog 1.0. Affected is the function uploadFileByEditomd of the file src/main/java/com/site/blog/my/core/controller/admin/BlogController.java. The manipulation of the argument editormd-image-file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T01:52:30.000000Z"}]}