CVE-2022-32177

In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the 'Normal Upload' functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin’s cookie leading to account takeover.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:*:*:*:*:*:*:*:*
cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:2.5.3:beta:*:*:*:*:*:*

History

21 Nov 2024, 07:05

Type Values Removed Values Added
References () https://github.com/flipped-aurora/gin-vue-admin/blob/v2.5.3beta/web/src/components/upload/common.vue#L29-L37 - Exploit, Third Party Advisory () https://github.com/flipped-aurora/gin-vue-admin/blob/v2.5.3beta/web/src/components/upload/common.vue#L29-L37 - Exploit, Third Party Advisory
References () https://www.mend.io/vulnerability-database/CVE-2022-32177 - Exploit, Third Party Advisory () https://www.mend.io/vulnerability-database/CVE-2022-32177 - Exploit, Third Party Advisory

Information

Published : 2022-10-14 07:15

Updated : 2024-11-21 07:05


NVD link : CVE-2022-32177

Mitre link : CVE-2022-32177

CVE.ORG link : CVE-2022-32177


JSON object : View

Products Affected

gin-vue-admin_project

  • gin-vue-admin
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type