Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be executed via a file that is added to the templates directory, if the victim's web browser accesses an untrusted website that uses JavaScript to send requests to localhost port 5000, and the web browser is running on the same machine as the "lektor server" command.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wv28-7fpw-fj49 | Lektor does not sanitize database path traversal |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 06 Aug 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T15:08:26.792Z
Reserved: 2024-03-08T00:00:00
Link: CVE-2024-28335
Updated: 2024-08-02T00:48:49.674Z
Status : Awaiting Analysis
Published: 2024-03-27T06:15:19.447
Modified: 2024-11-21T09:06:12.310
Link: CVE-2024-28335
No data.
OpenCVE Enrichment
No data.
Github GHSA