Lucene search

K
githubGitHub Advisory DatabaseGHSA-WV28-7FPW-FJ49
HistoryMar 27, 2024 - 6:30 a.m.

Lektor does not sanitize database path traversal

2024-03-2706:30:33
CWE-22
GitHub Advisory Database
github.com
8
lektor
database path traversal
shell command execution
security vulnerability
localhost
web browser

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

10.3%

Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be executed via a file that is added to the templates directory, if the victim’s web browser accesses an untrusted website that uses JavaScript to send requests to localhost port 5000, and the web browser is running on the same machine as the “lektor server” command.

Affected configurations

Vulners
Node
lektorRange3.4.0b13.4.0b11
OR
lektorRange03.3.11
VendorProductVersionCPE
*lektor*cpe:2.3:a:*:lektor:*:*:*:*:*:*:*:*

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

10.3%