We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration.
The issues were addressed in our last release, 2.1.59.
If you can’t update to 2.1.59, make sure your connector is not exposed without authentication.
Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time.
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to [email protected];
- The maintainers, by opening an issue on this repository.
packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html
blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities
github.com/Studio-42/elFinder
github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17
github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr
github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr
nvd.nist.gov/vuln/detail/CVE-2021-32682