Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.
History

Wed, 18 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Contao
Contao contao
CPEs cpe:2.3:a:contao:contao:-:*:*:*:*:*:*:*
Vendors & Products Contao
Contao contao
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Sep 2024 20:00:00 +0000

Type Values Removed Values Added
Description Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory.
Title Remote command execution through file upload in contao/core-bundle
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-17T19:56:00.791Z

Updated: 2024-09-18T13:17:36.013Z

Reserved: 2024-08-28T20:21:32.802Z

Link: CVE-2024-45398

cve-icon Vulnrichment

Updated: 2024-09-18T13:17:28.541Z

cve-icon NVD

Status : Received

Published: 2024-09-17T20:15:04.670

Modified: 2024-09-17T20:15:04.670

Link: CVE-2024-45398

cve-icon Redhat

No data.