CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.9%
We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration.
The issues were addressed in our last release, 2.1.59.
If you can’t update to 2.1.59, make sure your connector is not exposed without authentication.
Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time.
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to [email protected];
- The maintainers, by opening an issue on this repository.
packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html
blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/
github.com/advisories/GHSA-wph3-44rj-92pr
github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17
github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr
github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr
nvd.nist.gov/vuln/detail/CVE-2021-32682
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.9%