Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cfr5-vjc2-p7gj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directus 8 before 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain installations with the Apache HTTP Server and the local-storage driver (e.g., when the product was obtained from hub.docker.com).

Directus 8 before 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain installations with the Apache HTTP Server and the local-storage driver (e.g., when the product was obtained from hub.docker.com).

EPSS

Процентиль: 90%
0.0565
Низкий

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 8.8
nvd
почти 5 лет назад

Directus 8 before 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain installations with the Apache HTTP Server and the local-storage driver (e.g., when the product was obtained from hub.docker.com).

EPSS

Процентиль: 90%
0.0565
Низкий

Дефекты

CWE-434