We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49381

Plenti arbitrary file deletion vulnerability



Description

Plenti, a static site generator, has an arbitrary file deletion vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write deletion when a plenti user serves their website. This issue may lead to information loss. Version 0.7.2 fixes the vulnerability.

Reserved 2024-10-14 | Published 2024-10-25 | Updated 2024-10-25 | Assigner GitHub_M


HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Product status

< 0.7.2
affected

References

securitylab.github.com/...HSL-2024-297_GHSL-2024-298_plenti/

github.com/...dcd3505fac57adc2edf29f772d585c008/cmd/serve.go

github.com/plentico/plenti/releases/tag/v0.7.2

cve.org (CVE-2024-49381)

nvd.nist.gov (CVE-2024-49381)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-49381

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.