We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration.
The issues were addressed in our last release, 2.1.59.
If you can't update to 2.1.59, make sure your connector is not exposed without authentication.
Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time.
If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research@sonarsource.com; - The maintainers, by opening an issue on this repository.
{ "nvd_published_at": "2021-06-14T17:15:00Z", "cwe_ids": [ "CWE-22", "CWE-78", "CWE-918" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-06-15T21:01:45Z" }