Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49652: Unrestricted Upload of File with Dangerous Type in Renata Bracichowicz 3D Work In Progress

0
Unknown
VulnerabilityCVE-2024-49652cvecve-2024-49652
Published: Wed Oct 23 2024 (10/23/2024, 15:39:48 UTC)
Source: CVE Database V5
Vendor/Project: Renata Bracichowicz
Product: 3D Work In Progress

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Renata Bracichowicz 3D Work In Progress renee-work-in-progress allows Upload a Web Shell to a Web Server.This issue affects 3D Work In Progress: from n/a through <= 1.0.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 11:42:03 UTC

Technical Analysis

CVE-2024-49652 is a vulnerability identified in the Renata Bracichowicz 3D Work In Progress application, specifically affecting versions up to and including 1.0.3. The core issue is an unrestricted upload of files with dangerous types, which means the application fails to properly validate or restrict the types of files users can upload. This flaw allows an attacker to upload malicious files such as web shells directly to the web server hosting the application. Once a web shell is uploaded, the attacker can execute arbitrary commands remotely, potentially taking full control of the server environment. The vulnerability does not require authentication or user interaction, making it easier for attackers to exploit. The lack of patch or official mitigation guidance increases the urgency for users to apply their own protective measures. While the affected software is specialized and may not be widely deployed, any organization relying on this tool for 3D modeling or related workflows is at risk. The vulnerability was published on October 23, 2024, with no CVSS score assigned yet, and no known exploits have been reported in the wild. The unrestricted file upload vulnerability is a common and critical security issue that can lead to severe consequences including data breaches, service disruption, and lateral movement within networks.

Potential Impact

The impact of CVE-2024-49652 is potentially severe for organizations using the affected 3D Work In Progress software. Successful exploitation can lead to remote code execution on the web server, allowing attackers to execute arbitrary commands, deploy malware, or pivot to other internal systems. This compromises the confidentiality, integrity, and availability of the affected systems. Sensitive data stored or processed by the server could be exposed or altered. Additionally, attackers could disrupt business operations by defacing websites, deleting files, or causing denial of service. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where the software is exposed to the internet. Although the software’s niche market limits the scope, organizations in industries such as digital design, 3D modeling, and creative production that rely on this tool face significant operational and reputational risks. The absence of patches or mitigations further exacerbates the threat landscape.

Mitigation Recommendations

To mitigate CVE-2024-49652, organizations should immediately implement strict file upload validation and filtering controls to restrict allowed file types to safe formats only. Employ server-side checks to verify MIME types and file extensions, and consider using file content inspection to detect malicious payloads. Disable or restrict the execution permissions on directories used for file uploads to prevent execution of uploaded scripts or binaries. If possible, isolate the application in a sandboxed environment or container to limit the impact of a compromise. Monitor server logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected file uploads or command execution patterns. Apply network segmentation to reduce exposure of the affected server. Since no official patches are available, maintain close communication with the vendor for updates and consider temporary removal or replacement of the vulnerable software if feasible. Conduct regular backups and ensure recovery procedures are tested to minimize downtime in case of an incident.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-17T09:51:43.915Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74dfe6bfc5ba1df0175e

Added to database: 4/1/2026, 7:41:19 PM

Last enriched: 4/2/2026, 11:42:03 AM

Last updated: 4/6/2026, 2:59:23 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses