The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC.
History

Tue, 18 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Description The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out the attack. Exploitation of this vulnerability would allow an attacker to run commands of their choosing on the underlying operating system of the web server running LogicalDOC.
Title Remote Code Execution (RCE) via Automation Scripting
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: BlackDuck

Published: 2025-03-14T18:01:25.311Z

Updated: 2025-03-18T16:36:58.362Z

Reserved: 2024-12-02T14:24:46.526Z

Link: CVE-2024-54448

cve-icon Vulnrichment

Updated: 2025-03-17T16:20:51.453Z

cve-icon NVD

Status : Received

Published: 2025-03-14T18:15:30.617

Modified: 2025-03-14T18:15:30.617

Link: CVE-2024-54448

cve-icon Redhat

No data.