CVE-2024-47818: Saltcorn Server allows logged-in users to delete arbitrary files because of a path traversal vulnerability
(updated )
A logged-in user with any role can delete arbitrary files on the filesystem by calling the sync/clean_sync_dir
endpoint. The dir_name
POST parameter is not validated/sanitized and is used to construct the syncDir
that is deleted by calling fs.rm
.
References
- github.com/advisories/GHSA-43f3-h63w-p6f6
- github.com/saltcorn/saltcorn
- github.com/saltcorn/saltcorn/blob/v1.0.0-beta.15/packages/server/routes/sync.js
- github.com/saltcorn/saltcorn/commit/3c551261d0e230635774798009951fa83a07cc3a
- github.com/saltcorn/saltcorn/security/advisories/GHSA-43f3-h63w-p6f6
- nvd.nist.gov/vuln/detail/CVE-2024-47818
Detect and mitigate CVE-2024-47818 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →