MJML prior to 4.6.3 contains a path traversal vulnerability when processing the mj-include directive within an MJML document.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/mjmlio/mjml/commit/30e29ed2cdaec8684d60a6d12ea07b611c765a12 | third party advisory patch |
https://github.com/mjmlio/mjml/releases/tag/v4.6.3 | third party advisory release notes |
https://twitter.com/mjmlio | third party advisory |
https://mjml.io/community | vendor advisory |
https://rcesecurity.com | broken link |
http://seclists.org/fulldisclosure/2020/Jun/23 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/158111/MJML-4.6.2-Path-Traversal.html | exploit vdb entry third party advisory |