Code Injection Vulnerability in Gin-Vue-Admin Backend
CVE-2024-31457

7.7HIGH

Key Information:

Vendor
CVE Published:
9 April 2024

What is CVE-2024-31457?

A vulnerability exists in the backend of the gin-vue-admin management system, specifically within its Plugin System under the Plugin Template feature. This flaw allows an attacker to conduct a directory traversal attack by manipulating the 'plugName' parameter. By exploiting this vulnerability, attackers can create directories and files, such as 'api', 'config', 'global', 'model', 'router', 'service', and 'main.go', with arbitrary code injected into the Go files stored within these folders. The underlying issue stems from insufficient validation of the PlugName field within its structure. A patch has been released in a subsequent pseudoversion, but users are encouraged to manually implement filtering methods outlined in the GitHub Security Advisory as a temporary measure to mitigate this risk.

Affected Version(s)

gin-vue-admin < 0.0.0-20240409100909-b1b7427c6ea6

References

CVSS V3.1

Score:
7.7
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.