漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Craft CMS has a Path Traversal Vulnerability in AssetsController
Vulnerability Description
Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.5 and from version 5.0.0-RC1 to before version 5.9.11, the AssetsController->replaceFile() method has a targetFilename body parameter that is used unsanitized in a deleteFile() call before Assets::prepareAssetName() is applied on save. This allows an authenticated user with replaceFiles permission to delete arbitrary files within the same filesystem root by injecting ../ path traversal sequences into the filename. This could allow an authenticated user with replaceFiles permission on one volume to delete files in other folders/volumes that share the same filesystem root. This only affects local filesystems. This issue has been patched in versions 4.17.5 and 5.9.11.
CVSS Information
N/A
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Craft CMS 路径遍历漏洞
Vulnerability Description
Craft CMS是Craft CMS开源的一套内容管理系统(CMS)。 Craft CMS 4.0.0-RC1至4.17.5之前版本和5.0.0-RC1至5.9.11之前版本存在路径遍历漏洞,该漏洞源于AssetsController->replaceFile方法中targetFilename参数在保存前未经清理即用于deleteFile调用,可能导致具有replaceFiles权限的经过身份验证的用户通过注入路径遍历序列删除同一文件系统根目录下的任意文件。
CVSS Information
N/A
Vulnerability Type
N/A