CVE-2022-32176

In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the "Compress Upload" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:05

Type Values Removed Values Added
References () https://github.com/flipped-aurora/gin-vue-admin/blob/v2.5.3beta/web/src/components/upload/image.vue#L43-L49 - Exploit, Third Party Advisory () https://github.com/flipped-aurora/gin-vue-admin/blob/v2.5.3beta/web/src/components/upload/image.vue#L43-L49 - Exploit, Third Party Advisory
References () https://www.mend.io/vulnerability-database/CVE-2022-32176 - Exploit, Third Party Advisory () https://www.mend.io/vulnerability-database/CVE-2022-32176 - Exploit, Third Party Advisory

Information

Published : 2022-10-17 19:15

Updated : 2024-11-21 07:05


NVD link : CVE-2022-32176

Mitre link : CVE-2022-32176

CVE.ORG link : CVE-2022-32176


JSON object : View

Products Affected

gin-vue-admin_project

  • gin-vue-admin
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type