First published: Mon Oct 17 2022(Updated: )
In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the "Compress Upload" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Gin-vue-admin Project Gin-vue-admin | >=2.5.1<=2.5.3b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32176 is a vulnerability in Gin-Vue-Admin versions v2.5.1 through v2.5.3b that allows unrestricted file upload and execution of JavaScript code.
CVE-2022-32176 allows a low privilege attacker to upload files containing JavaScript code and execute it within the Media Library of Gin-Vue-Admin when viewed by an admin user.
CVE-2022-32176 has a severity value of 9, indicating a critical vulnerability.
To fix CVE-2022-32176, update your Gin-Vue-Admin installation to a version that is not affected, such as v2.5.3c or later.
You can find more information about CVE-2022-32176 at the following references: [GitHub](https://github.com/flipped-aurora/gin-vue-admin/blob/v2.5.3beta/web/src/components/upload/image.vue#L43-L49) and [Mend.io](https://www.mend.io/vulnerability-database/CVE-2022-32176).