Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e | Patch |
https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh | Exploit Vendor Advisory |
https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e | Patch |
https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh | Exploit Vendor Advisory |
Configurations
History
02 Jan 2025, 22:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:* | |
References | () https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e - Patch | |
References | () https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh - Exploit, Vendor Advisory | |
First Time |
Getgrav grav
Getgrav |
21 Nov 2024, 09:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e - | |
References | () https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh - |
22 Mar 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Mar 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-21 22:15
Updated : 2025-01-02 22:57
NVD link : CVE-2024-28116
Mitre link : CVE-2024-28116
CVE.ORG link : CVE-2024-28116
JSON object : View
Products Affected
getgrav
- grav