Lucene search

K
cve[email protected]CVE-2024-27923
HistoryMar 21, 2024 - 2:52 a.m.

CVE-2024-27923

2024-03-2102:52:21
CWE-434
CWE-287
web.nvd.nist.gov
44
grav
cms
remote code execution
permission validation
file name validation
cve-2024-27923

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Grav is a content management system (CMS). Prior to version 1.7.43, users who may write a page may use the frontmatter feature due to insufficient permission validation and inadequate file name validation. This may lead to remote code execution. Version 1.7.43 fixes this issue.

Affected configurations

Vulners
Node
getgravgravRange<1.7.43
VendorProductVersionCPE
getgravgrav*cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "getgrav",
    "product": "grav",
    "versions": [
      {
        "version": "< 1.7.43",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2024-27923