Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)
A path traversal vulnerability has been discovered in juzaweb CMS versions up to 3.4.2. The vulnerability affects an unknown function in the Theme Editor component, specifically in the file /admin-cp/theme/editor/default. This issue allows for manipulation that can lead to path traversal attacks.
The vulnerability has a CVSS v3.1 base score of 4.9 (Medium severity) and a CVSS v4.0 base score of 5.1 (Medium severity). The main impact is on confidentiality, with a potential for unauthorized access to sensitive information. The attack vector is network-based, allowing for remote exploitation. However, it requires high privileges to execute, which somewhat limits its potential impact. There is no direct impact on system integrity or availability.
One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.
A patch for this vulnerability is not explicitly mentioned in the provided information. However, since the vulnerability affects juzaweb CMS versions up to 3.4.2, it is likely that upgrading to a version newer than 3.4.2 (if available) would address this issue. The security team should check for the latest version of juzaweb CMS and consider upgrading as part of their remediation strategy.
1. Upgrade juzaweb CMS to a version newer than 3.4.2 if available. 2. Implement strong access controls to limit access to the Theme Editor component, especially for users with high privileges. 3. Use input validation and sanitization techniques to prevent path traversal attempts. 4. Consider implementing a Web Application Firewall (WAF) to detect and block path traversal attacks. 5. Regularly audit and monitor access to sensitive files and directories. 6. Apply the principle of least privilege to minimize the risk associated with compromised high-privilege accounts.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-7551. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-7551
A CVSS base score of 2.7 has been assigned.
A CVSS base score of 4.9 has been assigned.
A CVSS base score of 4.9 has been assigned.