First published: Tue Apr 12 2022(Updated: )
RiteCMS version 3.1.0 and below suffers from an arbitrary file deletion via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker might leverage the capability of arbitrary file deletion to circumvent certain web server security mechanisms such as deleting .htaccess file that would deactivate those security constraints.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RiteCMS | <=3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the RiteCMS arbitrary file deletion via path traversal vulnerability is CVE-2022-24248.
CVE-2022-24248 is classified as high severity with a CVSS score of 6.5.
RiteCMS version 3.1.0 and below are affected by CVE-2022-24248.
The vulnerability allows an authenticated attacker to delete any file in the web root and on the server that the PHP process user has the proper permissions to delete.
Yes, there are known exploits for CVE-2022-24248. Please refer to the provided references for more information.