CVE-2024-27921
CVSS V2 None
CVSS V3 None
Description
Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .css, .gif, etc. This critical security flaw poses severe risks, that can allow attackers to inject arbitrary code on the server, undermine integrity of backup files by overwriting existing files or creating new ones, and exfiltrate sensitive data using CSS exfiltration techniques. Upgrading to patched version 1.7.45 can mitigate the issue.
Overview
- CVE ID
- CVE-2024-27921
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-03-21T21:38:29.938Z
- Last Modified Date
- 2024-03-21T21:53:24.837Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc | x_refsource_CONFIRM |
https://github.com/getgrav/grav/commit/5928411b86bab05afca2b33db4e7386a44858e99 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-27921 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27921 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 01:47:53 | Added to TrackCVE |