CVE-2024-46987: Camaleon CMS vulnerable to arbitrary path traversal (GHSL-2024-183)
(updated )
A path traversal vulnerability accessible via MediaController’s download_private_file method allows authenticated users to download any file on the web server Camaleon CMS is running on (depending on the file permissions).
References
- codeql.github.com/codeql-query-help/ruby/rb-path-injection
- github.com/advisories/GHSA-cp65-5m9r-vc2c
- github.com/owen2345/camaleon-cms
- github.com/owen2345/camaleon-cms/commit/071b1b09d6d61ab02a5960b1ccafd9d9c2155a3e
- github.com/owen2345/camaleon-cms/security/advisories/GHSA-cp65-5m9r-vc2c
- github.com/rubysec/ruby-advisory-db/blob/master/gems/camaleon_cms/CVE-2024-46987.yml
- nvd.nist.gov/vuln/detail/CVE-2024-46987
- owasp.org/www-community/attacks/Path_Traversal
- www.reddit.com/r/rails/comments/1exwtdm/camaleon_cms_281_has_been_released
Detect and mitigate CVE-2024-46987 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →