HomeCraftcmsCVE-2024-52291

CVE-2024-52291

HIGH
8.4CVSS
Published: 2024-11-13
Updated: 2024-11-19
AI Analysis

Description

Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
high
User Action
required
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-22

Metadata

Primary Vendor
CRAFTCMS
Published
11/13/2024
Last Modified
11/19/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

craftcms : craft_cmscraftcms : craft_cmscraftcms : craft_cmscraftcms : craft_cmscraftcms : craft_cmscraftcms : craft_cms

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-52291 | HIGH Severity | CVEDatabase.com | CVEDatabase.com