CVE-2024-28116

Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue.
Configurations

No configuration.

History

21 Nov 2024, 09:05

Type Values Removed Values Added
References () https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e - () https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e -
References () https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh - () https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh -

22 Mar 2024, 12:45

Type Values Removed Values Added
Summary
  • (es) Grav es un sistema de gestión de contenidos de archivos planos de código abierto. Grav CMS anterior a la versión 1.7.45 es vulnerable a una inyección de plantilla del lado del servidor (SSTI), que permite a cualquier usuario autenticado (los permisos del editor son suficientes) ejecutar código arbitrario en el servidor remoto sin pasar por el entorno limitado de seguridad existente. La versión 1.7.45 contiene un parche para este problema.

21 Mar 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-21 22:15

Updated : 2024-11-21 09:05


NVD link : CVE-2024-28116

Mitre link : CVE-2024-28116

CVE.ORG link : CVE-2024-28116


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-1336

Improper Neutralization of Special Elements Used in a Template Engine