Lucene search

K
osvGoogleOSV:GHSA-VM6R-J788-HJH5
HistorySep 17, 2024 - 2:58 p.m.

Contao affected by remote command execution through file upload

2024-09-1714:58:35
Google
osv.dev
1
contao
remote command execution
file manager
malicious files
server
patches
web server
php files
scripts
security advisory
vulnerability
usd ag

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

20.0%

Impact

Back end users with access to the file manager can upload malicious files and execute them on the server.

Patches

Update to Contao 4.13.49, 5.3.15 or 5.4.3.

Workarounds

Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory.

References

https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads

For more information

If you have any questions or comments about this advisory, open an issue in contao/contao.

Credits

Thanks to Jakob Steeg from usd AG for reporting this vulnerability.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

20.0%

Related for OSV:GHSA-VM6R-J788-HJH5