CVE-2024-56975
Published: 28 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2024-56975 is a remote code execution vulnerability in InvoicePlane versions 1.6.11 and prior, with all versions tested as of December 2024 confirmed affected. The flaw resides in the upload_file method of the Upload controller, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its critical severity due to network accessibility, low attack complexity, and lack of prerequisites.
Unauthenticated attackers with network access to an affected InvoicePlane instance can exploit the vulnerability remotely without user interaction. Successful exploitation enables arbitrary code execution on the server, potentially granting full control over the system and leading to high-impact compromise of confidentiality, integrity, and availability.
Mitigation involves applying fixes from the referenced GitHub pull requests: https://github.com/InvoicePlane/InvoicePlane/pull/1127 and https://github.com/InvoicePlane/InvoicePlane/pull/1166, which address the issue in the Upload controller.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CVE describes an unauthenticated remote code execution flaw in a public-facing web application (InvoicePlane) via unrestricted file upload (CWE-434), directly enabling exploitation of public-facing applications for arbitrary code execution.