CVE-2021-27916 Vulnerability Details

  /     /     /  

CVE-2021-27916 Metadata Quick Info

CVE Published: 17/09/2024 | CVE Updated: 18/09/2024 | CVE Year: 2021
Source: Mautic | Vendor: Mautic | Product: Mautic
Status : PUBLISHED

CVE-2021-27916 Description

Prior to the patched version, logged in users of Mautic are vulnerable to Relative Path Traversal/Arbitrary File Deletion. Regardless of the level of access the Mautic user had, they could delete files other than those in the media folders such as system files, libraries or other important files. This vulnerability exists in the implementation of the GrapesJS builder in Mautic.

Metrics

CVSS Version: 3.1 | Base Score: 8.1 HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* NONE
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-22
CWE Name: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ( Path Traversal )
Source: Mautic

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-139
CAPEC Description: CAPEC-139 Relative Path Traversal


Source: NVD (National Vulnerability Database).