Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vm6r-j788-hjh5

Опубликовано: 17 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 8.3

Описание

Contao affected by remote command execution through file upload

Impact

Back end users with access to the file manager can upload malicious files and execute them on the server.

Patches

Update to Contao 4.13.49, 5.3.15 or 5.4.3.

Workarounds

Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory.

References

https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads

For more information

If you have any questions or comments about this advisory, open an issue in contao/contao.

Credits

Thanks to Jakob Steeg from usd AG for reporting this vulnerability.

Пакеты

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 4.0.0, < 4.13.49

4.13.49

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 5.0.0, < 5.3.15

5.3.15

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 5.4.0, < 5.4.3

5.4.3

EPSS

Процентиль: 43%
0.00211
Низкий

8.7 High

CVSS4

8.3 High

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 8.3
nvd
больше 1 года назад

Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.

EPSS

Процентиль: 43%
0.00211
Низкий

8.7 High

CVSS4

8.3 High

CVSS3

Дефекты

CWE-434