CVE-2024-52291Path Traversal in Craft CMS

CWE-22Path Traversal4 documents4 sources
Severity
7.2HIGHNVD
CNA8.4
EPSS
0.1%
top 67.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 13

Description

Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this w

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages3 packages

Packagistcraftcms/cms5.0.0-RC15.4.6+1
NVDcraftcms/craft_cms< 4.12.5+3
CVEListV5craftcms/cms>= 4.0.0-RC1, < 4.12.5, >= 5.0.0-RC1, < 5.4.6+1

🔴Vulnerability Details

3
CVEList
Craft has a Local File System Validation Bypass Leading to File Overwrite, Sensitive File Access, and Potential Code Execution2024-11-13
OSV
Local File System Validation Bypass Leading to File Overwrite, Sensitive File Access, and Potential Code Execution2024-11-13
GHSA
Local File System Validation Bypass Leading to File Overwrite, Sensitive File Access, and Potential Code Execution2024-11-13
CVE-2024-52291 — Path Traversal in Craftcms Craft CMS | cvebase