Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be executed via a file that is added to the templates directory, if the victim's web browser accesses an untrusted website that uses JavaScript to send requests to localhost port 5000, and the web browser is running on the same machine as the "lektor server" command.
History

Tue, 06 Aug 2024 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-03-27T00:00:00

Updated: 2024-08-06T15:08:26.792Z

Reserved: 2024-03-08T00:00:00

Link: CVE-2024-28335

cve-icon Vulnrichment

Updated: 2024-08-02T00:48:49.674Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-27T06:15:19.447

Modified: 2024-11-21T09:06:12.310

Link: CVE-2024-28335

cve-icon Redhat

No data.