Логотип exploitDog
bind:CVE-2025-52904
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-52904

Количество 3

Количество 3

nvd логотип

CVE-2025-52904

8 месяцев назад

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application's configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existen

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-hc8f-m8g5-8362

7 месяцев назад

File Browser: Command Execution not Limited to Scope

CVSS3: 8
EPSS: Низкий
fstec логотип

BDU:2025-08005

11 месяцев назад

Уязвимость функции Command Execution веб-менеджера для управления файлами и каталогами File Browser, позволяющая нарушителю получить доступ на чтение и изменение файлов

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-52904

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application's configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existen

CVSS3: 8
0%
Низкий
8 месяцев назад
github логотип
GHSA-hc8f-m8g5-8362

File Browser: Command Execution not Limited to Scope

CVSS3: 8
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-08005

Уязвимость функции Command Execution веб-менеджера для управления файлами и каталогами File Browser, позволяющая нарушителю получить доступ на чтение и изменение файлов

CVSS3: 8
0%
Низкий
11 месяцев назад

Уязвимостей на страницу