cve/2024/CVE-2024-7458.md

18 lines
993 B
Markdown
Raw Normal View History

2024-08-05 18:41:32 +00:00
### [CVE-2024-7458](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7458)
![](https://img.shields.io/static/v1?label=Product&message=eladmin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-27%20Path%20Traversal%3A%20'dir%2F..%2F..%2Ffilename'&color=brighgreen)
### Description
A vulnerability was found in elunez eladmin up to 2.7 and classified as critical. This issue affects some unknown processing of the file /api/deploy/upload /api/database/upload of the component Database Management/Deployment Management. The manipulation of the argument file leads to path traversal: 'dir/../../filename'. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273551.
### POC
#### Reference
- https://github.com/elunez/eladmin/issues/851
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds