漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
PHP Phar archives could be uploaded and executed in Kirby
Vulnerability Description
Kirby is a CMS. In Kirby CMS (getkirby/cms) before version 3.4.5, and Kirby Panel before version 2.5.14 , an editor with full access to the Kirby Panel can upload a PHP .phar file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file. Visitors without Panel access *cannot* use this attack vector. The problem has been patched in Kirby 2.5.14 and Kirby 3.4.5. Please update to one of these or a later version to fix the vulnerability. Note: Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
Vulnerability Type
危险类型文件的不加限制上传
Vulnerability Title
Kirby 代码问题漏洞
Vulnerability Description
Kirby是一套基于文件的内容管理系统(CMS)。 Kirby 2.5.14之前版本存在安全漏洞,该漏洞源于具有完全访问Kirby面板权限的编辑器可以上传一个PHP .phar文件并在服务器上执行它。如果您的一组经过身份验证的面板用户中可能有潜在的攻击者可利用该漏洞,
CVSS Information
N/A
Vulnerability Type
N/A