mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-12-30 05:58:39 +00:00
99 lines
3.7 KiB
JSON
99 lines
3.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-45398",
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-434: Unrestricted Upload of File with Dangerous Type",
|
|
"cweId": "CWE-434"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "contao",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "contao",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">=4.0.0, < 4.13.49"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">= 5.0.0, < 5.3.15"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": ">= 5.4.0, < 5.4.3"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5"
|
|
},
|
|
{
|
|
"url": "https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads",
|
|
"refsource": "MISC",
|
|
"name": "https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-vm6r-j788-hjh5",
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 8.3,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |