Vulnerability Description
pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pretalx | Pretalx | <= 2.3.1 |
Related Weaknesses (CWE)
References
- https://github.com/pretalx/pretalx/commit/60722c43cf975f319e94102e6bff3207237768Patch
- https://github.com/pretalx/pretalx/releases/tag/v2.3.2Release Notes
- https://pretalx.com/p/news/security-release-232/Vendor Advisory
- https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-ExploitPatchThird Party Advisory
- https://github.com/pretalx/pretalx/commit/60722c43cf975f319e94102e6bff3207237768Patch
- https://github.com/pretalx/pretalx/releases/tag/v2.3.2Release Notes
- https://pretalx.com/p/news/security-release-232/Vendor Advisory
- https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-ExploitPatchThird Party Advisory
FAQ
What is CVE-2023-28459?
CVE-2023-28459 is a vulnerability with a CVSS score of 6.5 (MEDIUM). pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files.
How severe is CVE-2023-28459?
CVE-2023-28459 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-28459?
Check the references section above for vendor advisories and patch information. Affected products include: Pretalx Pretalx.