CVE-2024-42485: Filament Excel Vulnerable to Path Traversal Attack on Export Download Endpoint
(updated )
The export download route /filament-excel/{path}
allowed downloading any file without login when the webserver allows ../
in the URL.
References
- github.com/advisories/GHSA-m3px-vjxr-fx4m
- github.com/pxlrbt/filament-excel
- github.com/pxlrbt/filament-excel/commit/af36f933b032aefccc87d17431b6e74673b04af5
- github.com/pxlrbt/filament-excel/commit/bda42891a4b0c15d5dab5da8c53a006ddadccfb7
- github.com/pxlrbt/filament-excel/releases/tag/v1.1.14
- github.com/pxlrbt/filament-excel/security/advisories/GHSA-m3px-vjxr-fx4m
- nvd.nist.gov/vuln/detail/CVE-2024-42485
Detect and mitigate CVE-2024-42485 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →