Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03N2oyLTd3aHItNnZweM4AAUzW
Elefant CMS Code Execution Vulnerability
An issue was discovered in Elefant CMS before 2.0.7. There is a PHP Code Execution Vulnerability in apps/filemanager/upload/drop.php
by using /filemanager/api/rm/.htaccess
to remove the .htaccess file, and then using a filename that ends in .php followed by space characters (for bypassing the blacklist).
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03N2oyLTd3aHItNnZweM4AAUzW
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 2 years ago
Updated: 10 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-77j2-7whr-6vpx, CVE-2018-16974
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-16974
- https://github.com/jbroadway/elefant/issues/287
- https://github.com/jbroadway/elefant/commit/49ba8cc24e9f009ce30d2c2eb9eefeb9be4ce1d0
- https://github.com/jbroadway/elefant/releases/tag/elefant_2_0_7_stable
- https://github.com/advisories/GHSA-77j2-7whr-6vpx
Blast Radius: 5.9
Affected Packages
packagist:elefant/cms
Dependent packages: 0Dependent repositories: 4
Downloads: 852 total
Affected Version Ranges: < 2.0.7
Fixed in: 2.0.7
All affected versions:
All unaffected versions: