CVE-2024-49380

Plenti, a static site generator, has an arbitrary file write vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write vulnerability when a plenti user serves their website. This issue may lead to Remote Code Execution. Version 0.7.2 fixes the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:plenti:plenti:*:*:*:*:*:*:*:*

History

06 May 2025, 17:53

Type Values Removed Values Added
First Time Plenti
Plenti plenti
CPE cpe:2.3:a:plenti:plenti:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/plentico/plenti/blob/01825e0dcd3505fac57adc2edf29f772d585c008/cmd/serve.go#L205 - () https://github.com/plentico/plenti/blob/01825e0dcd3505fac57adc2edf29f772d585c008/cmd/serve.go#L205 - Product
References () https://github.com/plentico/plenti/releases/tag/v0.7.2 - () https://github.com/plentico/plenti/releases/tag/v0.7.2 - Release Notes
References () https://securitylab.github.com/advisories/GHSL-2024-297_GHSL-2024-298_plenti/ - () https://securitylab.github.com/advisories/GHSL-2024-297_GHSL-2024-298_plenti/ - Third Party Advisory, Exploit

28 Oct 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Plenti, un generador de sitios estáticos, tiene una vulnerabilidad de escritura de archivos arbitrarios en versiones anteriores a la 0.7.2. El endpoint `/postLocal` es vulnerable a una vulnerabilidad de escritura de archivos arbitrarios cuando un usuario de plenti accede a su sitio web. Este problema puede provocar la ejecución remota de código. La versión 0.7.2 corrige la vulnerabilidad.

25 Oct 2024, 15:35

Type Values Removed Values Added
CWE CWE-78

25 Oct 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-25 14:15

Updated : 2025-05-06 17:53


NVD link : CVE-2024-49380

Mitre link : CVE-2024-49380

CVE.ORG link : CVE-2024-49380


JSON object : View

Products Affected

plenti

  • plenti
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')