pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Organizers can trigger the overwriting (with the standard pretalx 404 page content) of an arbitrary file.
References
Link | Resource |
---|---|
https://github.com/pretalx/pretalx/commit/60722c43cf975f319e94102e6bff320723776890 | Patch |
https://github.com/pretalx/pretalx/releases/tag/v2.3.2 | Release Notes |
https://pretalx.com/p/news/security-release-232/ | Vendor Advisory |
https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/ | Exploit Patch Third Party Advisory |
https://github.com/pretalx/pretalx/commit/60722c43cf975f319e94102e6bff320723776890 | Patch |
https://github.com/pretalx/pretalx/releases/tag/v2.3.2 | Release Notes |
https://pretalx.com/p/news/security-release-232/ | Vendor Advisory |
https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/ | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pretalx/pretalx/commit/60722c43cf975f319e94102e6bff320723776890 - Patch | |
References | () https://github.com/pretalx/pretalx/releases/tag/v2.3.2 - Release Notes | |
References | () https://pretalx.com/p/news/security-release-232/ - Vendor Advisory | |
References | () https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/ - Exploit, Patch, Third Party Advisory |
Information
Published : 2023-04-20 21:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28458
Mitre link : CVE-2023-28458
CVE.ORG link : CVE-2023-28458
JSON object : View
Products Affected
pretalx
- pretalx
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')