elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
References
Link | Resource |
---|---|
https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17 | Patch Third Party Advisory |
https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr | Third Party Advisory |
http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-06-14 10:15
Updated : 2022-11-08 19:53
NVD link : CVE-2021-32682
Mitre link : CVE-2021-32682
JSON object : View
CWE
Products Affected
std42
- elfinder