{"vulnerability": "cve-2024-47946", "sightings": [{"uuid": "ef24d952-6d83-4595-8e31-b3fd51fabd0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47946", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113627436345378507", "content": "", "creation_timestamp": "2024-12-10T07:51:23.485471Z"}, {"uuid": "c37636f7-9c97-47da-9f77-bd50a52c3ebc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47946", "type": "seen", "source": "https://t.me/cvedetector/12485", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47946 - Apache Struts Remote Code Execution Vul...\", \n  \"Content\": \"CVE ID : CVE-2024-47946 \nPublished : Dec. 10, 2024, 8:15 a.m. | 41\u00a0minutes ago \nDescription : If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as \"www-data\". \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T09:56:53.000000Z"}]}