MJML prior to 4.6.3 contains a path traversal vulnerability when processing the mj-include directive within an MJML document.
References
| Link | Resource |
|---|---|
| https://mjml.io/community | Vendor Advisory |
| https://twitter.com/mjmlio | Third Party Advisory |
| https://github.com/mjmlio/mjml/releases/tag/v4.6.3 | Release Notes Third Party Advisory |
| https://github.com/mjmlio/mjml/commit/30e29ed2cdaec8684d60a6d12ea07b611c765a12 | Patch Third Party Advisory |
| http://seclists.org/fulldisclosure/2020/Jun/23 | Exploit Mailing List Third Party Advisory |
| https://rcesecurity.com | Broken Link |
| http://packetstormsecurity.com/files/158111/MJML-4.6.2-Path-Traversal.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-06-17 07:15
Updated : 2020-06-22 17:09
NVD link : CVE-2020-12827
Mitre link : CVE-2020-12827
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
mjml
- mjml


