Логотип exploitDog
bind:CVE-2024-52292
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-52292

Количество 2

Количество 2

nvd логотип

CVE-2024-52292

около 1 года назад

Craft is a content management system (CMS). The dataUrl function can be exploited if an attacker has write permissions on system notification templates. This function accepts an absolute file path, reads the file's content, and converts it into a Base64-encoded string. By embedding this function within a system notification template, the attacker can exfiltrate the Base64-encoded file content through a triggered system email notification. Once the email is received, the Base64 payload can be decoded, allowing the attacker to read arbitrary files on the server. This is fixed in 5.4.9 and 4.12.8.

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-cw6g-qmjq-6w2w

около 1 года назад

Craft CMS Arbitrary System File Read

CVSS3: 7.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-52292

Craft is a content management system (CMS). The dataUrl function can be exploited if an attacker has write permissions on system notification templates. This function accepts an absolute file path, reads the file's content, and converts it into a Base64-encoded string. By embedding this function within a system notification template, the attacker can exfiltrate the Base64-encoded file content through a triggered system email notification. Once the email is received, the Base64 payload can be decoded, allowing the attacker to read arbitrary files on the server. This is fixed in 5.4.9 and 4.12.8.

CVSS3: 7.7
0%
Низкий
около 1 года назад
github логотип
GHSA-cw6g-qmjq-6w2w

Craft CMS Arbitrary System File Read

CVSS3: 7.7
0%
Низкий
около 1 года назад

Уязвимостей на страницу