Plenti, a static site generator, has an arbitrary file deletion vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write deletion when a plenti user serves their website. This issue may lead to information loss. Version 0.7.2 fixes the vulnerability.
References
Link | Resource |
---|---|
https://github.com/plentico/plenti/blob/01825e0dcd3505fac57adc2edf29f772d585c008/cmd/serve.go#L205 | Product |
https://github.com/plentico/plenti/releases/tag/v0.7.2 | Release Notes |
https://securitylab.github.com/advisories/GHSL-2024-297_GHSL-2024-298_plenti/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-10-25 14:15
Updated : 2024-11-14 23:04
NVD link : CVE-2024-49381
Mitre link : CVE-2024-49381
CVE.ORG link : CVE-2024-49381
JSON object : View
Products Affected
plenti
- plenti