Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be executed via a file that is added to the templates directory, if the victim's web browser accesses an untrusted website that uses JavaScript to send requests to localhost port 5000, and the web browser is running on the same machine as the "lektor server" command.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-22 | |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-03-27T00:00:00
Updated: 2024-08-06T15:08:26.792Z
Reserved: 2024-03-08T00:00:00
Link: CVE-2024-28335
Vulnrichment
Updated: 2024-08-02T00:48:49.674Z
NVD
Status : Awaiting Analysis
Published: 2024-03-27T06:15:19.447
Modified: 2024-11-21T09:06:12.310
Link: CVE-2024-28335
Redhat
No data.