Platform
php
Component
grav
Fixed in
1.7.46
A critical Path Traversal vulnerability has been discovered in Grav CMS versions prior to 1.7.45. This flaw allows attackers to manipulate file upload paths, enabling them to replace or create files with malicious extensions like .json, .zip, or .css. Successful exploitation can lead to arbitrary code injection, compromise of backup files, and even sensitive data exfiltration via CSS techniques. The vulnerability is addressed by upgrading to version 1.7.45.
The impact of this Path Traversal vulnerability is significant. Attackers can leverage it to overwrite existing files, potentially injecting malicious code into the Grav CMS installation. This could lead to complete server compromise, allowing attackers to execute arbitrary commands and gain persistent access. Furthermore, the ability to create or replace backup files poses a serious threat to data integrity and recovery. The use of CSS exfiltration techniques adds another layer of complexity, enabling attackers to stealthily extract sensitive data from the server without triggering traditional security alerts. The flat-file nature of Grav CMS exacerbates the risk, as there's no database layer to protect against direct file manipulation.
CVE-2024-27921 was publicly disclosed on March 21, 2024. The vulnerability's ease of exploitation and potential impact have not yet resulted in confirmed active exploitation campaigns, but the availability of a public advisory increases the risk. It is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are anticipated given the vulnerability's nature.
Exploit Status
EPSS
8.77% (92% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2024-27921 is to immediately upgrade Grav CMS to version 1.7.45 or later. If an immediate upgrade is not feasible due to compatibility issues or testing requirements, consider implementing temporary workarounds. These may include restricting file upload types to only explicitly allowed extensions, implementing stricter file name validation, and reviewing file upload permissions to ensure the web server user has minimal write access. Monitor file system activity for unexpected file creations or modifications. After upgrading, verify the fix by attempting a file upload with a malicious extension (e.g., .json) to confirm that the upload is blocked.
Actualice Grav a la versión 1.7.45 o superior. Esta versión contiene la corrección para la vulnerabilidad de path traversal en la carga de archivos. La actualización se puede realizar a través del panel de administración de Grav o mediante la línea de comandos.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-27921 is a Path Traversal vulnerability affecting Grav CMS versions up to 1.7.45, allowing attackers to manipulate file uploads and potentially inject malicious code.
You are affected if you are using Grav CMS version 1.7.45 or earlier. Upgrade to version 1.7.45 to resolve the vulnerability.
The recommended fix is to upgrade Grav CMS to version 1.7.45. If immediate upgrade is not possible, implement temporary workarounds like restricting file upload types.
While no confirmed active exploitation campaigns have been reported, the vulnerability's public disclosure increases the risk of exploitation.
Refer to the Grav CMS security advisory for detailed information and updates: [https://grav.0x.ninja/security/2024-03-21-path-traversal](https://grav.0x.ninja/security/2024-03-21-path-traversal)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.