Plenti, a static site generator, has an arbitrary file write vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write vulnerability when a plenti user serves their website. This issue may lead to Remote Code Execution. Version 0.7.2 fixes the vulnerability.
References
Link | Resource |
---|---|
https://github.com/plentico/plenti/blob/01825e0dcd3505fac57adc2edf29f772d585c008/cmd/serve.go#L205 | Product |
https://github.com/plentico/plenti/releases/tag/v0.7.2 | Release Notes |
https://securitylab.github.com/advisories/GHSL-2024-297_GHSL-2024-298_plenti/ | Third Party Advisory Exploit |
Configurations
History
06 May 2025, 17:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Plenti
Plenti plenti |
|
CPE | cpe:2.3:a:plenti:plenti:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/plentico/plenti/blob/01825e0dcd3505fac57adc2edf29f772d585c008/cmd/serve.go#L205 - Product | |
References | () https://github.com/plentico/plenti/releases/tag/v0.7.2 - Release Notes | |
References | () https://securitylab.github.com/advisories/GHSL-2024-297_GHSL-2024-298_plenti/ - Third Party Advisory, Exploit |
28 Oct 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Oct 2024, 15:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 |
25 Oct 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-25 14:15
Updated : 2025-05-06 17:53
NVD link : CVE-2024-49380
Mitre link : CVE-2024-49380
CVE.ORG link : CVE-2024-49380
JSON object : View
Products Affected
plenti
- plenti