Camaleon CMS: Arbitrary File Write Vulnerability
CVE-2024-46986

9.9CRITICAL

Key Information:

Vendor
Owen2345
Vendor
CVE Published:
18 September 2024

Summary

An arbitrary file write vulnerability exists in Camaleon CMS, a content management system built with Ruby on Rails. This flaw, presented through the MediaController's upload method, allows authenticated users to write files to any location on the web server, depending on the underlying filesystem permissions. If an attacker manages to upload a Ruby file to the config/initializers/ directory, this could potentially enable delayed remote code execution. This issue has been mitigated in the release of version 2.8.2, and users are strongly advised to upgrade as there are no known workarounds for this vulnerability.

Affected Version(s)

camaleon-cms < 2.8.2

References

EPSS Score

86% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

.