Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-46986 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical Arbitrary File Write vulnerability in Camaleon CMS.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-74 (Path Traversal/Injection). The flaw lies in the `MediaController` upload method, which fails to sanitize file paths, allowing arbitrary file writes outside intended directories.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **Camaleon CMS** versions **2.8.0** and likely earlier. Vendor: **owen2345**. Component: The core CMS file upload functionality.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Attacker Capabilities**: With access, hackers can execute arbitrary commands via uploaded Ruby scripts.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **Medium**. Requires **Authenticated User** access (PR:L). However, the attack complexity is Low (AC:L), and no user interaction is needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exp?**: **YES**. Active PoCs exist on GitHub (e.g., `vidura2/CVE-2024-46986`) and Nuclei templates. Automated exploitation tools are available for immediate use.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Camaleon CMS instances. Use Nuclei templates (`CVE-2024-46986.yaml`) to test the `MediaController` upload endpoint. Check if file uploads allow path traversal sequences.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix Status**: **Yes**. Version **2.8.1** has been released to address this. See GitHub Security Advisory GHSA-wmjg-vqhv-q5p5 for official patch details.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Restrict file upload permissions. Implement strict allowlists for file paths. Isolate the CMS in a container/sandbox. Disable unnecessary upload features if not needed.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL**. CVSS Score is High (9.8). With public exploits and RCE potential, immediate patching to v2.8.1 or strict mitigation is required.