elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr | third party advisory |
https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17 | third party advisory patch |
http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html | exploit vdb entry third party advisory |
https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/ | third party advisory exploit |