Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Affecting lektor package, versions [,3.3.11)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-LEKTOR-6501692
  • published27 Mar 2024
  • disclosed27 Mar 2024
  • creditkai6u

Introduced: 27 Mar 2024

CVE-2024-28335  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade Lektor to version 3.3.11 or higher.

Overview

Lektor is an A static content management system.

Affected versions of this package are vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'). An attacker can execute arbitrary shell commands by adding a malicious file to the templates directory. This exploit is triggered when a victim's web browser, running on the same machine as the lektor server command, accesses an untrusted website that uses JavaScript to send requests to localhost port 5000.

CVSS Scores

version 3.1