Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-23428— Directory Traversal

CVSS 8.6 · High EPSS 0.75% · P73
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-23428

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Directory Traversal
Source: NVD (National Vulnerability Database)
Vulnerability Description
This affects all versions of package elFinder.NetCore. The Path.Combine(...) method is used to create an absolute file path. Due to missing sanitation of the user input and a missing check of the generated path its possible to escape the Files directory via path traversal
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
elFinder 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
elFinder是一套基于Drupal平台的、开源的AJAX文件管理器。该产品提供多文件上传、图像缩放等功能。 Snyk中的elFinder.NetCore所有版本存在安全漏洞,该漏洞由于缺少对用户输入的检查和对生成路径的检查,攻击者有可能通过路径遍历来转义Files目录。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-elFinder.NetCore 0 ~ unspecified -

II. Public POCs for CVE-2021-23428

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-23428

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-09-01 · 37 CVEs total

CVE-2021-234278.6 HIGHArbitrary File Write via Archive Extraction (Zip Slip)
CVE-2021-234265.6 MEDIUMPrototype Pollution
CVE-2021-234365.6 MEDIUMPrototype Pollution
CVE-2021-234385.6 MEDIUMPrototype Pollution
CVE-2021-39378Open Solutions For Education openSIS SQL注入漏洞
CVE-2021-40350Christie Digital DWU850-GS 授权问题漏洞
CVE-2021-35508TeraRecon AQNetClient安全漏洞
CVE-2021-39379Open Solutions For Education openSIS SQL注入漏洞
CVE-2021-39377Open Solutions For Education openSIS SQL注入漏洞
CVE-2021-39373Samsung H3安全漏洞
CVE-2021-40382Compro Camera 安全漏洞
CVE-2021-40352OpenEMR 日志信息泄露漏洞
CVE-2021-38703KPN Experia WiFi 安全漏洞
CVE-2020-9002iPortalis 输入验证错误漏洞
CVE-2020-9000iPortalis 资源管理错误漏洞
CVE-2021-33582Cyrus IMAP 加密问题漏洞
CVE-2021-37415ZOHO ManageEngine ServiceDesk Plus 访问控制错误漏洞
CVE-2021-36235Ivanti Workspace Control 授权问题漏洞
CVE-2021-40353Open Solutions For Education openSIS SQL注入漏洞
CVE-2020-20341Yzmcms 代码问题漏洞

Showing top 20 of 37 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-23428

No comments yet


Leave a comment