Page 5 of 23 results (0.006 seconds)

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 1

grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking grav es vulnerable a una Dependencia de Cookies sin comprobación ni Comprobación de Integridad • https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07 https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea • CWE-565: Reliance on Cookies without Validation and Integrity Checking •

CVSS: 8.4EPSS: 5%CPEs: 1EXPL: 4

Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. The issue was addressed in version 1.7.11. Grav es una plataforma web basada en archivos. • https://www.exploit-db.com/exploits/49961 https://github.com/CsEnox/CVE-2021-29440 http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc https://packagist.org/packages/getgrav/grav • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x. El archivo Common/Grav.php en Grav versiones anteriores a 1.7 presenta un Redireccionamiento Abierto. Esto está parcialmente arreglado en la versión1.6.23 y sigue presente en la versión 1.6.x • https://getgrav.org/#changelog https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7 https://github.com/getgrav/grav/issues/3134 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •