CVE-2024-34982 Scanner
CVE-2024-34982 scanner - Arbitrary File Upload vulnerability in LyLme-Spage
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
29 days
Scan only one
Domain, IPv4
Toolbox
-
LyLme-Spage is a simple and lightweight landing page script used by developers and small businesses to create personalized webpages quickly. It’s popular for its ease of use and flexibility in customization. The software is widely used to host links, images, and other resources that can be shared across different platforms. Given its use in a variety of environments, it’s crucial to ensure that the software remains secure and free from vulnerabilities. The arbitrary file upload vulnerability poses a significant threat to the integrity and security of the webpages created using this software.
The vulnerability allows attackers to upload arbitrary files to the server running LyLme-Spage. This can be exploited by attackers to upload malicious files, including scripts that could be executed on the server. The issue is found in the file upload functionality, specifically in the /include/file.php
component. Successful exploitation can lead to remote code execution on the server, potentially allowing full control over the affected system.
The vulnerability resides in the /include/file.php
endpoint of LyLme-Spage. The file upload function does not properly validate the file types or contents being uploaded. This allows attackers to upload PHP files disguised as images or other acceptable file types. Upon uploading, these files can be accessed and executed, leading to the execution of arbitrary code on the server. The vulnerable parameter is the "file" parameter in the POST request, which handles the uploaded file. The lack of sufficient validation mechanisms makes the application susceptible to this kind of attack.
If exploited, this vulnerability can lead to severe consequences, including unauthorized access to the server, data breaches, and the potential for further attacks such as defacement or spreading malware. Attackers could gain complete control over the affected server, leading to a compromise of all data and services hosted on it. The ability to execute arbitrary code remotely could also be leveraged to pivot into other parts of the network, causing widespread damage.
By using the security scanning services provided by S4E, you can proactively identify and mitigate vulnerabilities like this one in your digital assets. Our platform provides continuous monitoring, comprehensive reporting, and actionable insights to keep your infrastructure secure. Join our platform to take advantage of our extensive database of vulnerabilities, and ensure that your systems are protected against the latest threats. S4E is your trusted partner in maintaining a robust security posture.
References: