Description
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-389p-fchr-q2mg | Path Traversal in ImpressCMS |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T04:29:01.527Z
Reserved: 2022-02-13T00:00:00.000Z
Link: CVE-2022-24977
No data.
Status : Modified
Published: 2022-02-14T12:15:27.867
Modified: 2024-11-21T06:51:29.507
Link: CVE-2022-24977
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA