Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be executed via a file that is added to the templates directory, if the victim's web browser accesses an untrusted website that uses JavaScript to send requests to localhost port 5000, and the web browser is running on the same machine as the "lektor server" command.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-22 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2024-03-27T00:00:00
Updated: 2024-08-06T15:08:26.792Z
Reserved: 2024-03-08T00:00:00
Link: CVE-2024-28335

Updated: 2024-08-02T00:48:49.674Z

Status : Awaiting Analysis
Published: 2024-03-27T06:15:19.447
Modified: 2024-11-21T09:06:12.310
Link: CVE-2024-28335

No data.