Camaleon CMS: Arbitrary File Write Vulnerability
CVE-2024-46986
9.9CRITICAL
Summary
An arbitrary file write vulnerability exists in Camaleon CMS, a content management system built with Ruby on Rails. This flaw, presented through the MediaController's upload method, allows authenticated users to write files to any location on the web server, depending on the underlying filesystem permissions. If an attacker manages to upload a Ruby file to the config/initializers/ directory, this could potentially enable delayed remote code execution. This issue has been mitigated in the release of version 2.8.2, and users are strongly advised to upgrade as there are no known workarounds for this vulnerability.
Affected Version(s)
camaleon-cms < 2.8.2
References
EPSS Score
86% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published