Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Sep 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:* |
Wed, 18 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Contao
Contao contao |
|
CPEs | cpe:2.3:a:contao:contao:-:*:*:*:*:*:*:* | |
Vendors & Products |
Contao
Contao contao |
|
Metrics |
ssvc
|
Tue, 17 Sep 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory. | |
Title | Remote command execution through file upload in contao/core-bundle | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-09-17T19:56:00.791Z
Updated: 2024-09-18T13:17:36.013Z
Reserved: 2024-08-28T20:21:32.802Z
Link: CVE-2024-45398
Vulnrichment
Updated: 2024-09-18T13:17:28.541Z
NVD
Status : Analyzed
Published: 2024-09-17T20:15:04.670
Modified: 2024-09-25T19:20:52.527
Link: CVE-2024-45398
Redhat
No data.