Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57487: n/a

0
Medium
VulnerabilityCVE-2024-57487cvecve-2024-57487
Published: Mon Jan 13 2025 (01/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:04:22 UTC

Technical Analysis

CVE-2024-57487 identifies a critical security weakness in the Code-Projects Online Car Rental System version 1.0, specifically in its file upload functionality. The vulnerability arises because the system does not validate the file extensions or MIME types of uploaded files, allowing an attacker to upload a PHP shell script. This uploaded shell can then be executed on the server, enabling the attacker to run arbitrary commands remotely. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), which typically leads to remote code execution (RCE). The CVSS 3.1 base score is 6.5, indicating medium severity with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N. This means the attack can be performed remotely over the network without any privileges or user interaction, with low attack complexity. The impact affects confidentiality and integrity partially, as attackers can execute commands but there is no direct indication of availability impact. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability poses a serious risk because web shells can be used as footholds for further attacks, including data exfiltration, privilege escalation, or lateral movement within the network. The lack of validation on file uploads is a common and critical security oversight in web applications, especially those handling sensitive business operations like car rental management.

Potential Impact

The primary impact of CVE-2024-57487 is unauthorized remote code execution on the affected server, which can lead to partial loss of confidentiality and integrity. Attackers can upload malicious PHP shells to execute arbitrary commands, potentially accessing sensitive customer data, modifying system configurations, or deploying additional malware. Although availability is not directly impacted, the presence of a web shell can facilitate further attacks that may degrade service or cause downtime. Organizations using this vulnerable system risk data breaches, reputational damage, and regulatory penalties if customer information is compromised. The ease of exploitation without authentication increases the threat level, especially for internet-facing deployments. The lack of known exploits in the wild suggests limited current exploitation but also indicates a window of opportunity for attackers to develop weaponized payloads. The vulnerability could be leveraged as an initial access vector in multi-stage attacks targeting the broader IT infrastructure of affected organizations.

Mitigation Recommendations

To mitigate CVE-2024-57487, organizations should implement strict server-side validation of all uploaded files, including verifying file extensions and MIME types against an allowlist of safe formats. Disallow uploading of executable files such as PHP, ASP, or other script types. Employ content inspection techniques to detect and block malicious payloads within files. Configure the web server to prevent execution of uploaded files in upload directories by disabling script execution permissions. Use web application firewalls (WAFs) to detect and block suspicious file upload attempts and command execution patterns. Regularly audit and monitor file upload directories for unauthorized files. If possible, update or patch the affected software once a vendor fix is available. Additionally, implement network segmentation and least privilege principles to limit the impact of a potential compromise. Conduct security awareness training for developers to prevent similar vulnerabilities in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd6b7ef31ef0b55b5af

Added to database: 2/25/2026, 9:38:30 PM

Last enriched: 2/28/2026, 12:04:22 AM

Last updated: 4/11/2026, 8:49:47 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses