Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:* |
Wed, 13 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Craftcms
Craftcms craft Cms |
|
CPEs | cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* | |
Vendors & Products |
Craftcms
Craftcms craft Cms |
|
Metrics |
ssvc
|
Wed, 13 Nov 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5. | |
Title | Craft has a Local File System Validation Bypass Leading to File Overwrite, Sensitive File Access, and Potential Code Execution | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-13T16:12:14.803Z
Updated: 2024-11-13T18:52:15.774Z
Reserved: 2024-11-06T19:00:26.394Z
Link: CVE-2024-52291
Vulnrichment
Updated: 2024-11-13T18:52:03.472Z
NVD
Status : Analyzed
Published: 2024-11-13T17:15:12.087
Modified: 2024-11-19T18:06:42.973
Link: CVE-2024-52291
Redhat
No data.