All the vulnerabilites related to flipped-aurora - gin-vue-admin
cve-2022-39305
Vulnerability from cvelistv5
Published
2022-10-24 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Gin-vue-admin vulnerable to Unrestricted Upload of File with Dangerous Type
References
Impacted products
▼ | Vendor | Product |
---|---|---|
flipped-aurora | gin-vue-admin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/utils/breakpoint_continue.go" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "status": "affected", "version": "2.5.4b" } ] } ], "descriptions": [ { "lang": "en", "value": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-24T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2" }, { "url": "https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/utils/breakpoint_continue.go" } ], "source": { "advisory": "GHSA-wrmq-4v4c-gxp2", "discovery": "UNKNOWN" }, "title": "Gin-vue-admin vulnerable to Unrestricted Upload of File with Dangerous Type" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39305", "datePublished": "2022-10-24T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24844
Vulnerability from cvelistv5
Published
2022-04-13 21:10
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
SQL Injection in github.com/flipped-aurora/gin-vue-admin
References
▼ | URL | Tags |
---|---|---|
https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425 | x_refsource_CONFIRM | |
https://github.com/flipped-aurora/gin-vue-admin/pull/1024 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
flipped-aurora | gin-vue-admin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/pull/1024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "status": "affected", "version": "\u003c 2.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login\uff09 and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-13T21:10:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/pull/1024" } ], "source": { "advisory": "GHSA-5g92-6hpp-w425", "discovery": "UNKNOWN" }, "title": "SQL Injection in github.com/flipped-aurora/gin-vue-admin", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24844", "STATE": "PUBLIC", "TITLE": "SQL Injection in github.com/flipped-aurora/gin-vue-admin" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gin-vue-admin", "version": { "version_data": [ { "version_value": "\u003c 2.5.1" } ] } } ] }, "vendor_name": "flipped-aurora" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login\uff09 and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425", "refsource": "CONFIRM", "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425" }, { "name": "https://github.com/flipped-aurora/gin-vue-admin/pull/1024", "refsource": "MISC", "url": "https://github.com/flipped-aurora/gin-vue-admin/pull/1024" } ] }, "source": { "advisory": "GHSA-5g92-6hpp-w425", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24844", "datePublished": "2022-04-13T21:10:10", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37896
Vulnerability from cvelistv5
Published
2024-06-17 19:33
Modified
2024-08-02 04:04
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in Gin-vue-admin
References
Impacted products
▼ | Vendor | Product |
---|---|---|
flipped-aurora | gin-vue-admin |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:flipped-aurora:gin-vue-admin:2.6.5:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "lessThanOrEqual": "2.6.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37896", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-26T14:19:33.501409Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-26T14:22:54.188Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:04:23.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp" }, { "name": "https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "status": "affected", "version": "\u003c 2.6.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin \u003c= v2.6.5 has SQL injection vulnerability. The SQL injection vulnerabilities occur when a web application allows users to input data into SQL queries without sufficiently validating or sanitizing the input. Failing to properly enforce restrictions on user input could mean that even a basic form input field can be used to inject arbitrary and potentially dangerous SQL commands. This could lead to unauthorized access to the database, data leakage, data manipulation, or even complete compromise of the database server. This vulnerability has been addressed in commit `53d033821` which has been included in release version 2.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-17T19:33:57.018Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp" }, { "name": "https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f" } ], "source": { "advisory": "GHSA-gf3r-h744-mqgp", "discovery": "UNKNOWN" }, "title": "SQL injection vulnerability in Gin-vue-admin" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37896", "datePublished": "2024-06-17T19:33:57.018Z", "dateReserved": "2024-06-10T19:54:41.361Z", "dateUpdated": "2024-08-02T04:04:23.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-21660
Vulnerability from cvelistv5
Published
2022-02-09 19:55
Modified
2024-08-03 02:46
Severity ?
EPSS score ?
Summary
Missing authorization in gin-vue-admin
References
▼ | URL | Tags |
---|---|---|
https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-xxvh-9c87-pqjx | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
flipped-aurora | gin-vue-admin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:46:39.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-xxvh-9c87-pqjx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "status": "affected", "version": "\u003c 2.4.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T19:55:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-xxvh-9c87-pqjx" } ], "source": { "advisory": "GHSA-xxvh-9c87-pqjx", "discovery": "UNKNOWN" }, "title": "Missing authorization in gin-vue-admin", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-21660", "STATE": "PUBLIC", "TITLE": "Missing authorization in gin-vue-admin" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gin-vue-admin", "version": { "version_data": [ { "version_value": "\u003c 2.4.7" } ] } } ] }, "vendor_name": "flipped-aurora" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862: Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-xxvh-9c87-pqjx", "refsource": "CONFIRM", "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-xxvh-9c87-pqjx" } ] }, "source": { "advisory": "GHSA-xxvh-9c87-pqjx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-21660", "datePublished": "2022-02-09T19:55:09", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-03T02:46:39.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24843
Vulnerability from cvelistv5
Published
2022-04-13 21:10
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Path Traversal in github.com/flipped-aurora/gin-vue-admin
References
▼ | URL | Tags |
---|---|---|
https://github.com/flipped-aurora/gin-vue-admin/issues/1002 | x_refsource_MISC | |
https://github.com/flipped-aurora/gin-vue-admin/pull/1024 | x_refsource_MISC | |
https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-32gq-gj42-mw43 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
flipped-aurora | gin-vue-admin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/issues/1002" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/pull/1024" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-32gq-gj42-mw43" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "status": "affected", "version": "\u003c 2.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin 2.50 has arbitrary file read vulnerability due to a lack of parameter validation. This has been resolved in version 2.5.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-13T21:10:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/issues/1002" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/pull/1024" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-32gq-gj42-mw43" } ], "source": { "advisory": "GHSA-32gq-gj42-mw43", "discovery": "UNKNOWN" }, "title": "Path Traversal in github.com/flipped-aurora/gin-vue-admin", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24843", "STATE": "PUBLIC", "TITLE": "Path Traversal in github.com/flipped-aurora/gin-vue-admin" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gin-vue-admin", "version": { "version_data": [ { "version_value": "\u003c 2.5.1" } ] } } ] }, "vendor_name": "flipped-aurora" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin 2.50 has arbitrary file read vulnerability due to a lack of parameter validation. This has been resolved in version 2.5.1. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/flipped-aurora/gin-vue-admin/issues/1002", "refsource": "MISC", "url": "https://github.com/flipped-aurora/gin-vue-admin/issues/1002" }, { "name": "https://github.com/flipped-aurora/gin-vue-admin/pull/1024", "refsource": "MISC", "url": "https://github.com/flipped-aurora/gin-vue-admin/pull/1024" }, { "name": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-32gq-gj42-mw43", "refsource": "CONFIRM", "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-32gq-gj42-mw43" } ] }, "source": { "advisory": "GHSA-32gq-gj42-mw43", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24843", "datePublished": "2022-04-13T21:10:16", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-31457
Vulnerability from cvelistv5
Published
2024-04-09 17:39
Modified
2024-08-02 01:52
Severity ?
EPSS score ?
Summary
gin-vue-admin background arbitrary code coverage vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
flipped-aurora | gin-vue-admin |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:flipped-aurora:gin-vue-admin:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "lessThan": "0.0.0-20240409100909-b1b7427c6ea6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31457", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-26T20:58:45.895171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T18:02:21.499Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:52:57.064Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4" }, { "name": "https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b" }, { "name": "https://pkg.go.dev/github.com/flipped-aurora/gin-vue-admin/server?tab=versions", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pkg.go.dev/github.com/flipped-aurora/gin-vue-admin/server?tab=versions" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "status": "affected", "version": "\u003c 0.0.0-20240409100909-b1b7427c6ea6" } ] } ], "descriptions": [ { "lang": "en", "value": "gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. gin-vue-admin pseudoversion 0.0.0-20240407133540-7bc7c3051067, corresponding to version 2.6.1, has a code injection vulnerability in the backend. In the Plugin System -\u003e Plugin Template feature, an attacker can perform directory traversal by manipulating the `plugName` parameter. They can create specific folders such as `api`, `config`, `global`, `model`, `router`, `service`, and `main.go` function within the specified traversal directory. Moreover, the Go files within these folders can have arbitrary code inserted based on a specific PoC parameter. The main reason for the existence of this vulnerability is the controllability of the PlugName field within the struct. Pseudoversion 0.0.0-20240409100909-b1b7427c6ea6, corresponding to commit b1b7427c6ea6c7a027fa188c6be557f3795e732b, contains a patch for the issue. As a workaround, one may manually use a filtering method available in the GitHub Security Advisory to rectify the directory traversal problem." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T17:39:52.347Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4" }, { "name": "https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b" }, { "name": "https://pkg.go.dev/github.com/flipped-aurora/gin-vue-admin/server?tab=versions", "tags": [ "x_refsource_MISC" ], "url": "https://pkg.go.dev/github.com/flipped-aurora/gin-vue-admin/server?tab=versions" } ], "source": { "advisory": "GHSA-gv3w-m57p-3wc4", "discovery": "UNKNOWN" }, "title": "gin-vue-admin background arbitrary code coverage vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-31457", "datePublished": "2024-04-09T17:39:52.347Z", "dateReserved": "2024-04-03T17:55:32.647Z", "dateUpdated": "2024-08-02T01:52:57.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39345
Vulnerability from cvelistv5
Published
2022-10-25 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Gin-vue-admin arbitrary file upload vulnerability caused by path traversal
References
Impacted products
▼ | Vendor | Product |
---|---|---|
flipped-aurora | gin-vue-admin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-7gc4-r5jr-9hxv" }, { "tags": [ "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/issues/1263" }, { "tags": [ "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/pull/1264" }, { "tags": [ "x_transferred" ], "url": "https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gin-vue-admin", "vendor": "flipped-aurora", "versions": [ { "status": "affected", "version": "\u003c 2.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-25T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-7gc4-r5jr-9hxv" }, { "url": "https://github.com/flipped-aurora/gin-vue-admin/issues/1263" }, { "url": "https://github.com/flipped-aurora/gin-vue-admin/pull/1264" }, { "url": "https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go" } ], "source": { "advisory": "GHSA-7gc4-r5jr-9hxv", "discovery": "UNKNOWN" }, "title": "Gin-vue-admin arbitrary file upload vulnerability caused by path traversal" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39345", "datePublished": "2022-10-25T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }