Lucene search

K
osvGoogleOSV:GO-2024-2702
HistoryMay 20, 2024 - 7:45 p.m.

Code injection vulnerability in github.com/flipped-aurora/gin-vue-admin/server

2024-05-2019:45:57
Google
osv.dev
4
github
flipped-aurora
code injection
vulnerability
directory traversal
plugin system
arbitrary code
go files

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Gin-vue-admin has a code injection vulnerability in the backend. In the Plugin System -> Plugin Template feature, an attacker can perform directory traversal by manipulating the ‘plugName’ parameter. They can create specific folders such as ‘api’, ‘config’, ‘global’, ‘model’, ‘router’, ‘service’, and ‘main.go’ function within the specified traversal directory. Moreover, the Go files within these folders can have arbitrary code inserted based on a specific PoC parameter.

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%