First published: Mon Oct 24 2022(Updated: )
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gin-vue-admin Project Gin-vue-admin | <2.5.4b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-39305.
The severity of CVE-2022-39305 is critical (9.8).
Gin-vue-admin is a backstage management system based on Vue and Gin.
Versions prior to 2.5.4b of Gin-vue-admin are affected by this vulnerability.
This vulnerability occurs due to the affected code failing to validate fileMd5 and fileName parameters during file upload, allowing arbitrary file reading.