CWE-646
Reliance on File Name or Extension of Externally-Supplied File
The product allows a file to be uploaded, but it relies on the file name or extension of the file to determine the appropriate behaviors. This could be used by attackers to cause the file to be misclassified and processed in a dangerous fashion.
CVE-2021-34639 (GCVE-0-2021-34639)
Vulnerability from cvelistv5
- CWE-646 - Reliance on File Name or Extension of Externally-Supplied File
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
W3 Eden, Inc. | WordPress Download Manager |
Version: 3.1.24 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:47.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/07/wordpress-download-manager-vulnerabilities/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WordPress Download Manager", "vendor": "W3 Eden, Inc.", "versions": [ { "lessThanOrEqual": "3.1.24", "status": "affected", "version": "3.1.24", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ramuel Gall, Wordfence" } ], "descriptions": [ { "lang": "en", "value": "Authenticated File Upload in WordPress Download Manager \u003c= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. \"payload.php.png\" which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-646", "description": "CWE-646 Reliance on File Name or Extension of Externally-Supplied File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-05T20:18:29", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/07/wordpress-download-manager-vulnerabilities/" } ], "source": { "discovery": "INTERNAL" }, "title": "WordPress Download Manager \u003c= 3.1.24 Authenticated Arbitrary File Upload", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@wordfence.com", "ID": "CVE-2021-34639", "STATE": "PUBLIC", "TITLE": "WordPress Download Manager \u003c= 3.1.24 Authenticated Arbitrary File Upload" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WordPress Download Manager", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "3.1.24", "version_value": "3.1.24" } ] } } ] }, "vendor_name": "W3 Eden, Inc." } ] } }, "credit": [ { "lang": "eng", "value": "Ramuel Gall, Wordfence" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Authenticated File Upload in WordPress Download Manager \u003c= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. \"payload.php.png\" which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-646 Reliance on File Name or Extension of Externally-Supplied File" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/07/wordpress-download-manager-vulnerabilities/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/07/wordpress-download-manager-vulnerabilities/" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2021-34639", "datePublished": "2021-08-05T20:18:29", "dateReserved": "2021-06-10T00:00:00", "dateUpdated": "2024-08-04T00:19:47.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-45599 (GCVE-0-2023-45599)
Vulnerability from cvelistv5
- CWE-646 - Reliance on File Name or Extension of Externally-Supplied File
Vendor | Product | Version | ||
---|---|---|---|---|
AiLux | imx6 bundle |
Version: 0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-45599", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-26T14:03:06.668648Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T14:03:15.616Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45599" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "imx6 bundle", "vendor": "AiLux", "versions": [ { "lessThan": "1.0.7-2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Andrea Palanca of Nozomi Networks found this bug during a security research activity." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A CWE-646 \u201cReliance on File Name or Extension of Externally-Supplied File\u201d vulnerability in the \u201ciec61850\u201d functionality of the web application allows a remote authenticated attacker to upload any arbitrary type of file into the device. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2." } ], "value": "A CWE-646 \u201cReliance on File Name or Extension of Externally-Supplied File\u201d vulnerability in the \u201ciec61850\u201d functionality of the web application allows a remote authenticated attacker to upload any arbitrary type of file into the device. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2." } ], "impacts": [ { "capecId": "CAPEC-17", "descriptions": [ { "lang": "en", "value": "CAPEC-17 Using Malicious Files" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-646", "description": "CWE-646 Reliance on File Name or Extension of Externally-Supplied File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-05T11:34:38.752Z", "orgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "shortName": "Nozomi" }, "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45599" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "assignerShortName": "Nozomi", "cveId": "CVE-2023-45599", "datePublished": "2024-03-05T11:34:38.752Z", "dateReserved": "2023-10-09T08:26:54.317Z", "dateUpdated": "2024-08-02T20:21:16.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38432 (GCVE-0-2024-38432)
Vulnerability from cvelistv5
- CWE-646 - Reliance on File Name or Extension of Externally-Supplied File
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38432", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-30T14:16:31.425620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-30T14:44:24.636Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:12:24.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Tafnit v8", "vendor": "Matrix", "versions": [ { "lessThan": "8.4.202", "status": "affected", "version": "All versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Gad Abuhatziera, Nimrod Bickels, Itay Cherdman - Sophtix Security LTD" } ], "datePublic": "2024-07-30T08:28:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMatrix\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eTafnit v8\u003c/span\u003e\n\n - \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCWE-646: Reliance on File Name or Extension of Externally-Supplied File\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "Matrix\u00a0Tafnit v8\n\n - \n\n\n\nCWE-646: Reliance on File Name or Extension of Externally-Supplied File" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-646", "description": "CWE-646: Reliance on File Name or Extension of Externally-Supplied File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-30T08:50:23.808Z", "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD" }, "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpgrade to version 8.4.202 or greater. Restrict file types allowed to upload\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "Upgrade to version 8.4.202 or greater. Restrict file types allowed to upload" } ], "source": { "advisory": "ILVN-2024-0170", "discovery": "UNKNOWN" }, "title": "Matrix \u2013 Tafnit v8 CWE-646: Reliance on File Name or Extension of Externally-Supplied File", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "assignerShortName": "INCD", "cveId": "CVE-2024-38432", "datePublished": "2024-07-30T08:50:23.808Z", "dateReserved": "2024-06-16T08:00:52.285Z", "dateUpdated": "2024-08-02T04:12:24.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-52052 (GCVE-0-2024-52052)
Vulnerability from cvelistv5
- CWE-646 - Reliance on File Name or Extension of Externally-Supplied File
Vendor | Product | Version | ||
---|---|---|---|---|
Wowza | Streaming Engine |
Version: 4.3.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:wowza:streaming_engine:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "streaming_engine", "vendor": "wowza", "versions": [ { "lessThan": "4.9.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-52052", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-22T16:11:16.138326Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-22T16:11:48.554Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "Streaming Engine", "vendor": "Wowza", "versions": [ { "lessThan": "4.9.1", "status": "affected", "version": "4.3.0", "versionType": "cpe" } ] } ], "datePublic": "2024-11-21T22:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eWowza Streaming Engine below 4.9.1 permits an authenticated Streaming Engine Manager administrator to define a custom application property and poison a stream target for high-privilege remote code execution.\u003c/span\u003e" } ], "value": "Wowza Streaming Engine below 4.9.1 permits an authenticated Streaming Engine Manager administrator to define a custom application property and poison a stream target for high-privilege remote code execution." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.4, "baseSeverity": "CRITICAL", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-646", "description": "CWE-646: Reliance on File Name or Extension of Externally-Supplied File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-21T22:20:15.758Z", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "url": "https://www.wowza.com/docs/wowza-streaming-engine-4-9-1-release-notes" }, { "url": "https://www.rapid7.com/blog/post/2024/11/20/multiple-vulnerabilities-in-wowza-streaming-engine-fixed/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Stream Target Remote Code Execution in Wowza Streaming Engine", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2024-52052", "datePublished": "2024-11-21T22:20:15.758Z", "dateReserved": "2024-11-05T16:58:15.300Z", "dateUpdated": "2024-11-22T16:11:48.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8517 (GCVE-0-2024-8517)
Vulnerability from cvelistv5
- CWE-646 - Reliance on File Name or Extension of Externally-Supplied File
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "spip", "vendor": "spip", "versions": [ { "lessThanOrEqual": "4.3.1", "status": "affected", "version": "4.3.0", "versionType": "custom" }, { "lessThanOrEqual": "4.2.15", "status": "affected", "version": "4.2.0", "versionType": "custom" }, { "lessThan": "4.1.18", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-8517", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-06T20:29:04.243583Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T20:30:45.388Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SPIP", "vendor": "SPIP", "versions": [ { "lessThanOrEqual": "4.3.1", "status": "affected", "version": "4.3.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.15", "status": "affected", "version": "4.2.0", "versionType": "semver" }, { "lessThanOrEqual": "4.1.18", "status": "affected", "version": "4.1.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Louka Jacques-Chevallier" }, { "lang": "en", "type": "finder", "value": "Arthur Deloffre" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SPIP before 4.3.2, 4.2.16, and \n4.1.18 is vulnerable to a command injection issue. A \nremote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.\u003cbr\u003e" } ], "value": "SPIP before 4.3.2, 4.2.16, and \n4.1.18 is vulnerable to a command injection issue. A \nremote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-646", "description": "CWE-646: Reliance on File Name or Extension of Externally-Supplied File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-09T15:49:22.874Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "exploit", "technical-description" ], "url": "https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_2_a_big_upload/" }, { "tags": [ "vendor-advisory" ], "url": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-3-2-SPIP-4-2-16-SPIP-4-1-18.html" }, { "tags": [ "third-party-advisory" ], "url": "https://vulncheck.com/advisories/spip-upload-rce" }, { "tags": [ "exploit", "technical-description" ], "url": "https://vozec.fr/researchs/spip-preauth-rce-2024-big-upload/" } ], "source": { "discovery": "UNKNOWN" }, "title": "SPIP Bigup Multipart File Upload OS Command Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2024-8517", "datePublished": "2024-09-06T15:55:35.349Z", "dateReserved": "2024-09-06T14:37:41.755Z", "dateUpdated": "2024-09-09T15:49:22.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-1889 (GCVE-0-2025-1889)
Vulnerability from cvelistv5
- CWE-646 - Reliance on File Name or Extension of Externally-Supplied File
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
mmaitre314 | picklescan |
Version: 0.0.1 ≤ 0.0.21 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1889", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-03T20:06:20.369355Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-03T20:06:37.045Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://pypi.org/project/picklescan/", "defaultStatus": "unaffected", "packageName": "picklescan", "product": "picklescan", "repo": "https://github.com/mmaitre314/picklescan", "vendor": "mmaitre314", "versions": [ { "lessThanOrEqual": "0.0.21", "status": "affected", "version": "0.0.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Trevor Madge (@madgetr) of Sonatype" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic.\u003cbr\u003e" } ], "value": "picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-646", "description": "CWE-646 Reliance on File Name or Extension of Externally-Supplied File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T11:43:39.089Z", "orgId": "103e4ec9-0a87-450b-af77-479448ddef11", "shortName": "Sonatype" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1889" }, { "tags": [ "third-party-advisory" ], "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v" } ], "source": { "discovery": "UNKNOWN" }, "title": "picklescan - Security scanning bypass via non-standard file extensions", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "103e4ec9-0a87-450b-af77-479448ddef11", "assignerShortName": "Sonatype", "cveId": "CVE-2025-1889", "datePublished": "2025-03-03T18:38:10.046Z", "dateReserved": "2025-03-03T15:51:41.860Z", "dateUpdated": "2025-03-04T11:43:39.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Description:
- Make decisions on the server side based on file content and not on file name or extension.
CAPEC-209: XSS Using MIME Type Mismatch
An adversary creates a file with scripting content but where the specified MIME type of the file is such that scripting is not expected. The adversary tricks the victim into accessing a URL that responds with the script file. Some browsers will detect that the specified MIME type of the file does not match the actual type of its content and will automatically switch to using an interpreter for the real content type. If the browser does not invoke script filters before doing this, the adversary's script may run on the target unsanitized, possibly revealing the victim's cookies or executing arbitrary script in their browser.