Логотип exploitDog
bind:CVE-2024-27921
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-27921

Количество 2

Количество 2

nvd логотип

CVE-2024-27921

почти 2 года назад

Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .css, .gif, etc. This critical security flaw poses severe risks, that can allow attackers to inject arbitrary code on the server, undermine integrity of backup files by overwriting existing files or creating new ones, and exfiltrate sensitive data using CSS exfiltration techniques. Upgrading to patched version 1.7.45 can mitigate the issue.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-m7hx-hw6h-mqmc

почти 2 года назад

Grav File Upload Path Traversal

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-27921

Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .css, .gif, etc. This critical security flaw poses severe risks, that can allow attackers to inject arbitrary code on the server, undermine integrity of backup files by overwriting existing files or creating new ones, and exfiltrate sensitive data using CSS exfiltration techniques. Upgrading to patched version 1.7.45 can mitigate the issue.

CVSS3: 8.8
6%
Низкий
почти 2 года назад
github логотип
GHSA-m7hx-hw6h-mqmc

Grav File Upload Path Traversal

CVSS3: 8.8
6%
Низкий
почти 2 года назад

Уязвимостей на страницу