任意文件写入导致 Camaleon CMS 中出现 RCE(CVE-2024-46986)

admin 2024-09-19 11:57:06 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
任意文件写入导致 Camaleon CMS 中出现 RCE(CVE-2024-46986)

CVE编号

CVE-2024-46986

利用情况

暂无

补丁情况

N/A

披露时间

2024-09-19
漏洞描述
Camaleon CMS is a dynamic and advanced content management system based on Ruby on Rails. An arbitrary file write vulnerability accessible via the upload method of the MediaController allows authenticated users to write arbitrary files to any location on the web server Camaleon CMS is running on (depending on the permissions of the underlying filesystem). E.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. This issue has been addressed in release version 2.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://codeql.github.com/codeql-query-help/ruby/rb-path-injection
https://github.com/owen2345/camaleon-cms/security/advisories/GHSA-wmjg-vqhv-q5p5
https://owasp.org/www-community/attacks/Path_Traversal
https://www.reddit.com/r/rails/comments/1exwtdm/camaleon_cms_281_has_been_released
CVSS3评分 9.9
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 已更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-74 输出中的特殊元素转义处理不恰当(注入)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-43024利用情况 暂无补丁情况 N/A披露时间 2024-09-19漏洞描述Multiple stored cross
评论:0   参与:  0