Vulnerability Description
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Std42 | Elfinder | < 2.1.58 |
Related Weaknesses (CWE)
References
- https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabiliExploitThird Party Advisory
- https://github.com/Studio-42/elFinderThird Party Advisory
- https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b53PatchThird Party Advisory
- https://github.com/Studio-42/elFinder/issues/3295ExploitIssue TrackingPatch
- https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554Third Party Advisory
- https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabiliExploitThird Party Advisory
- https://github.com/Studio-42/elFinderThird Party Advisory
- https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b53PatchThird Party Advisory
- https://github.com/Studio-42/elFinder/issues/3295ExploitIssue TrackingPatch
- https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554Third Party Advisory
FAQ
What is CVE-2021-23394?
CVE-2021-23394 is a vulnerability with a CVSS score of 8.1 (HIGH). The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
How severe is CVE-2021-23394?
CVE-2021-23394 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-23394?
Check the references section above for vendor advisories and patch information. Affected products include: Std42 Elfinder.