← Retour aux CVEs
CVE-2024-30162
HIGH7.2
Description
Invision Community through 4.7.16 allows remote code execution via the applications/core/modules/admin/editor/toolbar.php IPS\core\modules\admin\editor\_toolbar::addPlugin() method. This method handles uploaded ZIP files that are extracted into the applications/core/interface/ckeditor/ckeditor/plugins/ directory without properly verifying their content. This can be exploited by admin users (with the toolbar_manage permission) to write arbitrary PHP files into that directory, leading to execution of arbitrary PHP code in the context of the web server user.
Details CVE
Score CVSS v3.17.2
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisHIGH
Interaction utilisateurNONE
Publie6/7/2024
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-345
References
http://seclists.org/fulldisclosure/2024/Apr/21(cve@mitre.org)
https://invisioncommunity.com(cve@mitre.org)
http://seclists.org/fulldisclosure/2024/Apr/21(af854a3a-2127-422b-91ae-364da2661108)
https://invisioncommunity.com(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.