CVE-2021-32682 – studio-42/elfinder
Package
Manager: composer
Name: studio-42/elfinder
Vulnerable Version: >=0 <2.1.59
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.93532 pctl0.99824
Details
elFinder before 2.1.59 contains multiple vulnerabilities leading to RCE ### Impact We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration. ### Patches The issues were addressed in our last release, 2.1.59. ### Workarounds If you can't update to 2.1.59, make sure your connector is not exposed without authentication. ### Reference Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research@sonarsource.com; - The maintainers, by opening an issue on this repository.
Metadata
Created: 2021-06-16T17:04:29Z
Modified: 2022-08-11T00:02:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-wph3-44rj-92pr/GHSA-wph3-44rj-92pr.json
CWE IDs: ["CWE-22", "CWE-78", "CWE-918"]
Alternative ID: GHSA-wph3-44rj-92pr
Finding: F100
Auto approve: 1