10 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

Gin 0.7.4 allows execution of arbitrary code when a crafted file is opened, e.g., via require('child_process'). Gin v0.7.4 permite la ejecución de código arbitrario cuando un archivo manipulado esta abierto, por ejemplo, a través de: require('child_process'). Gin Markdown Editor version 0.7.4 suffers from an arbitrary code execution vulnerability. • https://www.exploit-db.com/exploits/51469 http://packetstormsecurity.com/files/172530/Gin-Markdown-Editor-0.7.4-Arbitrary-Code-Execution.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability. • https://github.com/flipped-aurora/gin-vue-admin/issues/1309 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version. Gin-vue-admin es un sistema de administración de bambalinas basado en vue y gin, que separa la parte delantera y la trasera de la pila completa. • https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go https://github.com/flipped-aurora/gin-vue-admin/issues/1263 https://github.com/flipped-aurora/gin-vue-admin/pull/1264 https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-7gc4-r5jr-9hxv • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds. • https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/utils/breakpoint_continue.go https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 2

In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the "Compress Upload" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover. En "Gin-Vue-Admin", las versiones v2.5.1 hasta v2.5.3b son vulnerables a la subida de archivos sin restricciones que conlleva a una ejecución de código javascript, mediante de la funcionalidad "Compress Upload" a la biblioteca multimedia. Cuando un usuario administrador visualiza el archivo subido, un atacante poco privilegiado conseguirá acceso a la cookie del administrador conllevando a una toma de control de la cuenta • https://github.com/flipped-aurora/gin-vue-admin/blob/v2.5.3beta/web/src/components/upload/image.vue#L43-L49 https://www.mend.io/vulnerability-database/CVE-2022-32176 • CWE-434: Unrestricted Upload of File with Dangerous Type •