Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-73gx-x7r9-77x2

Опубликовано: 26 фев. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9.1

Описание

Mautic allows Remote Code Execution and File Deletion in Asset Uploads

Summary

This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users.

  • Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts.

  • Path Traversal File Deletion: A Path Traversal vulnerability exists in the upload validation process. Due to improper handling of path components, an authenticated user can manipulate the file deletion process to delete arbitrary files on the host system.

Mitigation

Please update to 5.2.3 or later.

Workarounds

None

References

https://owasp.org/www-community/attacks/Code_Injection https://owasp.org/www-community/attacks/Path_Traversal

If you have any questions or comments about this advisory:

Email us at security@mautic.org

Пакеты

Наименование

mautic/core

composer
Затронутые версииВерсия исправления

< 5.2.3

5.2.3

EPSS

Процентиль: 72%
0.00738
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-23
CWE-94

Связанные уязвимости

CVSS3: 9.1
nvd
12 месяцев назад

This advisory addresses two critical security vulnerabilities present in Mautic versions before 5.2.3. These vulnerabilities could be exploited by authenticated users. * Remote Code Execution (RCE) via Asset Upload: A Remote Code Execution vulnerability has been identified in the asset upload functionality. Insufficient enforcement of allowed file extensions allows an attacker to bypass restrictions and upload executable files, such as PHP scripts. * Path Traversal File Deletion: A Path Traversal vulnerability exists in the upload validation process. Due to improper handling of path components, an authenticated user can manipulate the file deletion process to delete arbitrary files on the host system.

EPSS

Процентиль: 72%
0.00738
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-23
CWE-94