GHSA-fp63-499m-hq6m

Suggest an improvement
Source
https://github.com/advisories/GHSA-fp63-499m-hq6m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/07/GHSA-fp63-499m-hq6m/GHSA-fp63-499m-hq6m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fp63-499m-hq6m
Aliases
Published
2021-07-12T16:53:00Z
Modified
2023-11-08T04:05:59.225411Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Files or Directories Accessible to External Parties in ether/logs
Details

Impact

A vulnerability was found that allowed authenticated admin users to access any file on the server.

Patches

The vulnerability has been fixed in 3.0.4.

Workarounds

We recommend disabling the plugin if untrustworthy sources have admin access.

For more information

If you have any questions or comments about this advisory: * Open an issue in ether/logs

Database specific
{
    "nvd_published_at": "2021-07-09T14:15:00Z",
    "github_reviewed_at": "2021-07-09T14:04:21Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-552"
    ]
}
References

Affected packages

Packagist / ether/logs

Package

Name
ether/logs
Purl
pkg:composer/ether/logs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.4

Affected versions

3.*

3.0.0
3.0.1
3.0.2
3.0.3