Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS05eGhoLTNtNzgtZ3Znas4AA-FS
CLSA Directory Traversal vulnerability
Directory Traversal vulnerability in Marimer LLC CSLA .Net before 8.0 allows a remote attacker to execute arbitrary code via a crafted script to the MobileFormatter component.
Fixes for this issue have been backported to the 5.x, 6.x, and 7.x branches of CSLA. CSLA version 5.5.4 contains a fix. As of time of publication, 6.x and 7.x do not have numbered versions containing the fix but do have fix commits available.
Permalink: https://github.com/advisories/GHSA-9xhh-3m78-gvgjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05eGhoLTNtNzgtZ3Znas4AA-FS
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 6 months ago
Updated: 5 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Percentage: 0.00044
EPSS Percentile: 0.1207
Identifiers: GHSA-9xhh-3m78-gvgj, CVE-2024-28698
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-28698
- https://github.com/MarimerLLC/csla/pull/3552
- https://www.intruder.io/research/path-traversal-and-code-execution-in-csla-net-cve-2024-28698
- https://github.com/MarimerLLC/csla/commit/2c32a5748a0a4bb0159285dfad61d4050e890080
- https://github.com/MarimerLLC/csla/commit/445bc609bc117f62cabf49e1462f7a43b0f8f9a2
- https://github.com/MarimerLLC/csla/commit/8fbdd8c773bfeb9ba3e52d91b5a664848629b13a
- https://github.com/MarimerLLC/csla/commit/f3a5c3474974f60ce3c8ffbd5d91c23a1e397ea4
- https://github.com/MarimerLLC/csla/releases/tag/v5.5.4
- https://github.com/advisories/GHSA-9xhh-3m78-gvgj
Blast Radius: 1.0
Affected Packages
nuget:Csla
Dependent packages: 30Dependent repositories: 0
Downloads: 899,345 total
Affected Version Ranges: >= 7.0.0, <= 7.0.5, >= 6.0.0, <= 6.2.2, < 5.5.4
Fixed in: 8.0.0, 8.0.0, 5.5.4
All affected versions: 5.0.0, 5.0.1, 5.1.0, 5.2.0, 5.3.0, 5.3.1, 5.3.2, 5.4.0, 5.4.1, 5.4.2, 5.5.0, 5.5.1, 5.5.2, 5.5.3, 6.0.0, 6.1.0, 6.2.0, 6.2.1, 6.2.2, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5
All unaffected versions: 5.5.4, 7.0.6, 8.0.0, 8.0.1, 8.1.0, 8.1.1, 8.2.0, 8.2.1, 8.2.2, 8.2.3, 8.2.4, 8.2.5, 8.2.6, 8.2.7, 8.2.8