Gridea version 0.9.3 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Gridea. This is possible because the application has the 'nodeIntegration' option enabled.
References
Link | Resource |
---|---|
https://fluidattacks.com/advisories/marshmello/ | Exploit Third Party Advisory |
https://github.com/getgridea/gridea | Product |
https://fluidattacks.com/advisories/marshmello/ | Exploit Third Party Advisory |
https://github.com/getgridea/gridea | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://fluidattacks.com/advisories/marshmello/ - Exploit, Third Party Advisory | |
References | () https://github.com/getgridea/gridea - Product |
Information
Published : 2022-09-30 17:15
Updated : 2024-11-21 07:21
NVD link : CVE-2022-40274
Mitre link : CVE-2022-40274
CVE.ORG link : CVE-2022-40274
JSON object : View
Products Affected
gridea
- gridea
linux
- linux_kernel
CWE