A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. If the public view setting is enabled, a attacker can upload a PHP-file that will be available for execution for a few milliseconds before it is removed, leading to execution of code on the underlying system. The vulnerability has been remediated in version 1.52.02.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://csirt.divd.nl/CVE-2024-27114 |
![]() ![]() |
History
Thu, 19 Sep 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Soplanning
Soplanning soplanning |
|
CPEs | cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:* | |
Vendors & Products |
Soplanning
Soplanning soplanning |
Thu, 12 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
So Planning
So Planning simple Online Planning |
|
CPEs | cpe:2.3:a:so_planning:simple_online_planning:*:*:*:*:*:*:*:* | |
Vendors & Products |
So Planning
So Planning simple Online Planning |
|
Metrics |
cvssV3_1
|
Wed, 11 Sep 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. If the public view setting is enabled, a attacker can upload a PHP-file that will be available for execution for a few milliseconds before it is removed, leading to execution of code on the underlying system. The vulnerability has been remediated in version 1.52.02. | |
Title | Remote Code Execution through File Upload in SOPlanning before 1.52.02 | |
Weaknesses | CWE-367 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: DIVD
Published:
Updated: 2025-01-09T07:56:49.069Z
Reserved: 2024-02-19T19:21:08.620Z
Link: CVE-2024-27114

Updated: 2024-09-12T13:13:30.692Z

Status : Analyzed
Published: 2024-09-11T14:15:13.040
Modified: 2024-09-19T14:27:11.790
Link: CVE-2024-27114

No data.