Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51789: Unrestricted Upload of File with Dangerous Type in UjW0L Image Classify

0
Unknown
VulnerabilityCVE-2024-51789cvecve-2024-51789
Published: Mon Nov 11 2024 (11/11/2024, 05:57:21 UTC)
Source: CVE Database V5
Vendor/Project: UjW0L
Product: Image Classify

Description

Unrestricted Upload of File with Dangerous Type vulnerability in UjW0L Image Classify image-classify allows Upload a Web Shell to a Web Server.This issue affects Image Classify: from n/a through <= 1.0.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 08:04:22 UTC

Technical Analysis

CVE-2024-51789 is a security vulnerability identified in the UjW0L Image Classify software, specifically affecting versions up to and including 1.0.0. The vulnerability arises from the application's failure to properly restrict the types of files that can be uploaded. This unrestricted file upload flaw allows an attacker to upload malicious files, such as web shells, directly to the web server hosting the application. Once a web shell is uploaded, the attacker can execute arbitrary commands remotely, potentially gaining full control over the server environment. This can lead to data theft, server manipulation, lateral movement within the network, and deployment of further malware or ransomware. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no CVSS score has been assigned and no known exploits are currently reported in the wild, the technical details indicate a severe security gap. The lack of official patches or mitigations from the vendor further exacerbates the threat. The vulnerability impacts the confidentiality, integrity, and availability of affected systems, making it a critical concern for organizations relying on this software for image classification tasks.

Potential Impact

The impact of CVE-2024-51789 is significant for organizations using UjW0L Image Classify, as exploitation can lead to complete server compromise. Attackers can upload web shells, enabling remote code execution and unauthorized access to sensitive data. This can result in data breaches, service disruption, and potential pivoting to other internal systems. The vulnerability threatens confidentiality by exposing sensitive information, integrity by allowing unauthorized changes, and availability by potentially disrupting services. Given the ease of exploitation without authentication or user interaction, the scope of affected systems could be broad, especially in environments where Image Classify is deployed on publicly accessible servers. Organizations in sectors such as technology, research, healthcare, and government that utilize image classification software may face heightened risks. The absence of patches and known exploits suggests a window of opportunity for attackers, emphasizing the urgency of mitigation.

Mitigation Recommendations

To mitigate CVE-2024-51789, organizations should immediately implement strict file upload validation to restrict allowed file types and sizes. Employ server-side checks to verify file extensions and MIME types, and use allowlists rather than blocklists. Deploy web application firewalls (WAFs) with rules to detect and block suspicious file uploads and web shell signatures. Restrict web server permissions to limit execution rights in upload directories, preventing execution of uploaded files. Isolate the application environment using containerization or sandboxing to reduce lateral movement risks. Monitor server logs for unusual file uploads or access patterns indicative of exploitation attempts. Until an official patch is released, consider disabling or restricting the file upload feature if feasible. Regularly back up critical data and ensure incident response plans are updated to address potential web shell intrusions. Engage with the vendor for updates and patches, and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-11-04T09:57:36.650Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd751be6bfc5ba1df02e1b

Added to database: 4/1/2026, 7:42:19 PM

Last enriched: 4/2/2026, 8:04:22 AM

Last updated: 4/4/2026, 8:23:40 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses