CVE-2022-41418
HIGH
7,2
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
An issue in the component BlogEngine/BlogEngine.NET/AppCode/Api/UploadController.cs of BlogEngine.NET v3.3.8.0 allows attackers to execute arbitrary code via uploading a crafted PNG file.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0128
Percentile
0,8th
Updated
EPSS Score Trend (Last 90 Days)
22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
StableCommon Consequences
Security Scopes Affected:
Integrity
Confidentiality
Availability
Potential Impacts:
Execute Unauthorized Code Or Commands
Modify Files Or Directories
Read Files Or Directories
Dos: Crash, Exit, Or Restart
Applicable Platforms
Technologies:
AI/ML
Application
Blogengine.Net by Blogengine
CPE Identifier
View Detailed Analysis
cpe:2.3:a:blogengine:blogengine.net:3.3.8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://gist.github.com/tree-chtsec/22a0a531ea188fd5b76fe11d32f41e95
https://gist.github.com/tree-chtsec/a02258bb6dea0d16e7e631898c066e05
https://github.com/BlogEngine/BlogEngine.NET/commit/7f927567db94462ffd37e128c0a…
https://www.chtsecurity.com/news/8719b7f3-1129-4fb4-8801-298970d81df7
https://gist.github.com/tree-chtsec/22a0a531ea188fd5b76fe11d32f41e95
https://gist.github.com/tree-chtsec/a02258bb6dea0d16e7e631898c066e05
https://github.com/BlogEngine/BlogEngine.NET/commit/7f927567db94462ffd37e128c0a…
https://www.chtsecurity.com/news/8719b7f3-1129-4fb4-8801-298970d81df7