CVE-2026-1776

UNKNOWN
中文标题:
(暂无数据)
英文标题:
Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulne
CVSS分数: N/A
发布时间: 2026-03-10 07:38:01
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v1
漏洞描述
中文描述:

(暂无数据)

英文描述:

Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulnerability in the AWS S3 uploader implementation that allows authenticated users to read arbitrary files from the web server’s filesystem. The issue occurs in the download_private_file functionality when the application is configured to use the CamaleonCmsAwsUploader backend. Unlike the local uploader implementation, the AWS uploader does not validate file paths with valid_folder_path?, allowing directory traversal sequences to be supplied via the file parameter. As a result, any authenticated user, including low-privileged registered users, can access sensitive files such as /etc/passwd. This issue represents a bypass of the incomplete fix for CVE-2024-46987 and affects deployments using the AWS S3 storage backend.

CWE类型:
CWE-22
标签:
(暂无数据)
受影响产品
暂无受影响产品信息
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
disclosure@vulncheck.com OTHER
nvd.nist.gov
访问
disclosure@vulncheck.com OTHER
nvd.nist.gov
访问
disclosure@vulncheck.com OTHER
nvd.nist.gov
访问
disclosure@vulncheck.com OTHER
nvd.nist.gov
访问
CVSS评分详情
暂无CVSS评分信息
时间信息
发布时间:
2026-03-10 07:38:01
修改时间:
2026-03-10 07:38:01
创建时间:
2026-03-11 06:00:02
更新时间:
2026-03-12 06:00:02
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
NVD nvd_CVE-2026-1776 2026-03-11 02:00:06 2026-03-10 22:00:02
版本与语言
当前版本: v1
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
暂无变更历史