First published: Fri Oct 14 2022(Updated: )
In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the 'Normal Upload' functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin’s cookie leading to account takeover.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Gin-vue-admin Project Gin-vue-admin | >=2.5.1<=2.5.2 | |
Gin-vue-admin Project Gin-vue-admin | =2.5.3-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-32177.
The severity level of CVE-2022-32177 is critical.
Gin-Vue-Admin versions v2.5.1 through v2.5.3beta are affected by CVE-2022-32177.
CVE-2022-32177 allows for Unrestricted File Upload, potentially leading to the execution of JavaScript code.
At the moment, there is no known fix available for CVE-2022-32177. Please refer to the vendor's website or official advisories for any updates or patches.