We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-52600

Statamic CMS has Path Traversal in Asset Upload



Description

Statmatic is a Laravel and Git powered content management system (CMS). Prior to version 5.17.0, assets uploaded with appropriately crafted filenames may result in them being placed in a location different than what was configured. The issue affects front-end forms with `assets` fields and other places where assets can be uploaded, although users would need upload permissions anyway. Files can be uploaded so they would be located on the server in a different location, and potentially override existing files. Traversal outside an asset container is not possible. This path traversal vulnerability has been fixed in 5.17.0.

Reserved 2024-11-14 | Published 2024-11-19 | Updated 2024-12-03 | Assigner GitHub_M


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 5.17.0
affected

References

github.com/...ic/cms/security/advisories/GHSA-p7f6-8mcm-fwv3

github.com/...ommit/0c07c10009a2439c8ee56c8faefd1319dc6e388d

github.com/...ommit/400875b20f40e1343699d536a432a6fc284346da

github.com/...ommit/4cc2c9bd0f39a93b3fc7e9ef0f12792576fd380d

cve.org (CVE-2024-52600)

nvd.nist.gov (CVE-2024-52600)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-52600

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.