CVE-2021-32682

elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/ - Exploit, Third Party Advisory () https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/ - Exploit, Third Party Advisory
References () https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17 - Patch, Third Party Advisory () https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17 - Patch, Third Party Advisory
References () https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr - Third Party Advisory () https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr - Third Party Advisory

Information

Published : 2021-06-14 17:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32682

Mitre link : CVE-2021-32682

CVE.ORG link : CVE-2021-32682


JSON object : View

Products Affected

std42

  • elfinder
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-918

Server-Side Request Forgery (SSRF)