CVE-2021-46116

jpress 4.2.0 is vulnerable to remote code execution via io.jpress.web.admin._TemplateController#doInstall. The admin panel provides a function through which attackers can install templates and inject some malicious code.
References
Link Resource
http://jpress.com Product
https://github.com/JPressProjects/jpress Product
https://github.com/JPressProjects/jpress/issues/168 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*

History

02 Feb 2022, 14:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 7.2
CWE CWE-434
References (MISC) https://github.com/JPressProjects/jpress/issues/168 - (MISC) https://github.com/JPressProjects/jpress/issues/168 - Exploit, Issue Tracking, Third Party Advisory
References (MISC) https://github.com/JPressProjects/jpress - (MISC) https://github.com/JPressProjects/jpress - Product
References (MISC) http://jpress.com - (MISC) http://jpress.com - Product
CPE cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*

26 Jan 2022, 17:33

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-26 17:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-46116

Mitre link : CVE-2021-46116

CVE.ORG link : CVE-2021-46116


JSON object : View

Products Affected

jpress

  • jpress
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type