Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46016
HistoryMar 26, 2024 - 1:18 p.m.

Path Traversal

2024-03-2613:18:01
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
4
getgrav/grav
path traversal
upload file
vulnerability
file manipulation
specific extensions

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

getgrav/grav is vulnerable to Path Traversal. The vulnerability is due to missing .. sanitization of upload file paths, which allows an attacker to replace or create files with specific extensions such as .json, .zip, .css, .gif, etc.

CPENameOperatorVersion
getgrav/gravle1.7.44
getgrav/gravle1.7.44

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Related for VERACODE:46016