A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.veeam.com/kb4649 |
![]() ![]() |
History
Mon, 09 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Veeam
Veeam service Provider Console |
|
Weaknesses | CWE-94 | |
CPEs | cpe:2.3:a:veeam:service_provider_console:*:*:*:*:*:*:*:* | |
Vendors & Products |
Veeam
Veeam service Provider Console |
|
Metrics |
ssvc
|
Sat, 07 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A code injection vulnerability that allows a low-privileged user with REST API access granted to remotely upload arbitrary files to the VSPC server using REST API, leading to remote code execution on VSPC server. | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-09T15:15:08.789Z
Reserved: 2024-06-28T01:04:08.821Z
Link: CVE-2024-39715

Updated: 2024-09-09T15:13:45.778Z

Status : Awaiting Analysis
Published: 2024-09-07T17:15:12.663
Modified: 2024-09-09T16:35:04.780
Link: CVE-2024-39715

No data.