Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57968: CWE-434 Unrestricted Upload of File with Dangerous Type in Advantive VeraCore

0
Critical
VulnerabilityCVE-2024-57968cvecve-2024-57968cwe-434
Published: Mon Feb 03 2025 (02/03/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Advantive
Product: VeraCore

Description

Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:32:30 UTC

Technical Analysis

CVE-2024-57968 is a critical security vulnerability identified in Advantive VeraCore, a software product used for order management and supply chain operations. The flaw exists in versions prior to 2024.4.2.1 and involves an unrestricted file upload vulnerability classified under CWE-434. Specifically, authenticated remote users can exploit the upload.aspx endpoint to upload files to directories not intended for such uploads, including folders accessible via web browsing by other users. This lack of proper validation and restriction on file upload destinations allows attackers to place malicious files on the server, potentially leading to remote code execution, unauthorized data access, or disruption of service. The vulnerability requires the attacker to have valid authentication credentials but does not require additional user interaction, making it easier to exploit once credentials are obtained. The CVSS v3.1 base score is 9.9, reflecting critical severity with network attack vector, low attack complexity, privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential impact is severe. The vulnerability highlights the need for secure file upload handling, including strict validation of file types, upload paths, and access controls to prevent unauthorized file placement and execution. Organizations relying on VeraCore should monitor for patches and apply them promptly to mitigate this risk.

Potential Impact

The impact of CVE-2024-57968 is severe for organizations using Advantive VeraCore. Exploitation allows attackers with valid credentials to upload arbitrary files to unintended directories, potentially accessible by other users or the system itself. This can lead to remote code execution, enabling attackers to take full control of the affected system, steal sensitive data, modify or delete critical files, and disrupt business operations. The compromise of confidentiality, integrity, and availability can affect supply chain management, order processing, and other critical business functions dependent on VeraCore. Given the critical CVSS score and the nature of the vulnerability, organizations face risks of data breaches, financial loss, reputational damage, and regulatory penalties. The requirement for authentication limits exploitation to insiders or attackers who have compromised credentials, but this does not significantly reduce risk in environments where credential theft or phishing is common. The absence of known exploits in the wild currently provides a window for proactive mitigation but also underscores the urgency to patch before exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2024-57968, organizations should: 1) Apply the official patch from Advantive as soon as it becomes available to fix the unrestricted file upload flaw. 2) Implement strict server-side validation of uploaded files, including checking file types, sizes, and sanitizing file names to prevent dangerous file types from being accepted. 3) Restrict upload directories to locations not accessible via web browsing or execution contexts, ensuring uploaded files cannot be executed or accessed by unauthorized users. 4) Enforce the principle of least privilege on accounts with upload permissions, limiting who can authenticate and upload files. 5) Monitor logs for unusual upload activity or access to upload.aspx, and implement anomaly detection to identify potential exploitation attempts. 6) Use web application firewalls (WAFs) with rules to detect and block suspicious file upload patterns. 7) Educate users on credential security to reduce the risk of compromised accounts that could exploit this vulnerability. 8) Conduct regular security assessments and penetration tests focusing on file upload functionalities to identify and remediate weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-02-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b6247d717aace26c53

Added to database: 10/21/2025, 7:06:30 PM

Last enriched: 2/28/2026, 3:32:30 AM

Last updated: 3/23/2026, 12:27:52 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses