{"id":29889,"date":"2025-04-23T15:56:20","date_gmt":"2025-04-23T15:56:20","guid":{"rendered":""},"modified":"2025-05-12T12:19:23","modified_gmt":"2025-05-12T12:19:23","slug":"cve-2024-40071-arbitrary-file-upload-vulnerability-in-sourcecodester-online-id-generator-system-1-0","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-40071-arbitrary-file-upload-vulnerability-in-sourcecodester-online-id-generator-system-1-0\/","title":{"rendered":"<strong>CVE-2024-40071: Arbitrary File Upload Vulnerability in Sourcecodester Online ID Generator System 1.0<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2024-40071 is a severe vulnerability found in the Sourcecodester Online ID Generator System 1.0. This vulnerability allows for arbitrary file uploads, leading to the execution of arbitrary code by attackers. Business organizations and individuals who use this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-40073-critical-sql-injection-vulnerability-in-sourcecodester-online-id-generator-system-1-0\/\"  data-wpil-monitor-id=\"36388\">system for generating<\/a> IDs are at risk. The severity of this vulnerability is magnified by its potential to lead to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31491-critical-vulnerability-in-autogpt-leads-to-leakage-of-cross-domain-cookies-and-protected-headers\/\"  data-wpil-monitor-id=\"34253\">system<\/a> compromise or data leakage, which can have severe consequences for the affected entity, including loss of data, financial implications and reputational damage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-40071<br \/>\nSeverity: Critical (9.8 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/yale-new-haven-health-system-data-breach-a-comprehensive-analysis-of-a-cybersecurity-breach-impacting-5-5-million-patients\/\"  data-wpil-monitor-id=\"38595\">System compromise or data<\/a> leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1824463610\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-40072-high-risk-sql-injection-vulnerability-in-sourcecodester-online-id-generator-system-1-0\/\"  data-wpil-monitor-id=\"36208\">Sourcecodester Online ID Generator System<\/a> | 1.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-6220-piotnet-forms-plugin-vulnerability-in-wordpress-allows-arbitrary-file-uploads\/\"  data-wpil-monitor-id=\"34527\">vulnerability exploits the file<\/a> upload functionality of the Sourcecodester Online ID Generator System. The system settings file, id_generator\/classes\/SystemSettings.php?f=update_settings, does not adequately validate user-supplied input, allowing an attacker to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-48243-critical-remote-code-execution-vulnerability-allowing-unauthorized-file-upload\/\"  data-wpil-monitor-id=\"34116\">upload<\/a> and execute a malicious PHP file. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-48262-remote-denial-of-service-and-potential-remote-code-execution-vulnerability\/\"  data-wpil-monitor-id=\"34296\">execution can compromise the system and lead to potential<\/a> data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2815904267\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-50123-exploitable-vulnerability-in-hozard-alarm-system-sms-authentication\/\"  data-wpil-monitor-id=\"34909\">vulnerability could be exploited<\/a>. An attacker may craft a malicious PHP <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-13744-arbitrary-file-upload-vulnerability-in-booster-for-woocommerce-wordpress-plugin\/\"  data-wpil-monitor-id=\"34569\">file and upload<\/a> it via an HTTP POST request.<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/id_generator\/classes\/SystemSettings.php?f=update_settings HTTP\/1.1\nHost: target.example.com\nContent-Type: multipart\/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW\n------WebKitFormBoundary7MA4YWxkTrZu0gW\nContent-Disposition: form-data; name=&quot;uploaded_file&quot;; filename=&quot;malicious.php&quot;\nContent-Type: application\/x-php\n&lt;?php\n\/\/ malicious code here\n?&gt;\n------WebKitFormBoundary7MA4YWxkTrZu0gW--<\/code><\/pre>\n<p>This request uploads a PHP file containing malicious code, which can then be executed on the server, compromising the system and <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-48263-unauthenticated-remote-attack-leading-to-dos-and-potential-rce\/\"  data-wpil-monitor-id=\"34361\">potentially leading<\/a> to data leakage.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-45949-phpgurukul-user-management-system-session-hijacking-vulnerability\/\"  data-wpil-monitor-id=\"41146\">Users of the affected system<\/a> are advised to apply the vendor patch as soon as it becomes available. In the meantime, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can be used to provide temporary mitigation. Regularly monitoring <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24351-remote-logging-vulnerability-in-ctrlx-os-can-lead-to-root-level-system-compromise\/\"  data-wpil-monitor-id=\"42159\">system logs<\/a> and network traffic can also help in detecting any unusual activity, and immediate action should be taken if any such activity is detected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2024-40071 is a severe vulnerability found in the Sourcecodester Online ID Generator System 1.0. This vulnerability allows for arbitrary file uploads, leading to the execution of arbitrary code by attackers. Business organizations and individuals who use this system for generating IDs are at risk. The severity of this vulnerability is magnified by its potential [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-29889","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/29889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=29889"}],"version-history":[{"count":12,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/29889\/revisions"}],"predecessor-version":[{"id":37471,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/29889\/revisions\/37471"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=29889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=29889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=29889"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=29889"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=29889"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=29889"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=29889"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=29889"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=29889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}