Overview
- Description
- In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the 'Normal Upload' functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin’s cookie leading to account takeover.
- Source
- vulnerabilitylab@mend.io
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9
- Impact score
- 6
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E0062A1-B2B9-42AB-8E46-8B4B1DCE71D8", "versionEndIncluding": "2.5.2", "versionStartIncluding": "2.5.1" }, { "criteria": "cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:2.5.3:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C134734-016F-4CF0-BFF8-EBFC029AFDCD" } ], "operator": "OR" } ] } ]