Saltcorn is an extensible, open source, no-code database application builder. A logged-in user with any role can delete arbitrary files on the filesystem by calling the `sync/clean_sync_dir` endpoint. The `dir_name` POST parameter is not validated/sanitized and is used to construct the `syncDir` that is deleted by calling `fs.rm`. This issue has been addressed in release version 1.0.0-beta16 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
No configuration.
History
10 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Oct 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-07 22:15
Updated : 2024-10-10 12:57
NVD link : CVE-2024-47818
Mitre link : CVE-2024-47818
CVE.ORG link : CVE-2024-47818
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')