Learn about CVE-2023-29200, a path traversal vulnerability in Contao's file manager allowing unauthorized access to system files. Update to patched versions for security.
This article provides detailed information about CVE-2023-29200, a path traversal vulnerability in contao/core-bundle file manager.
Understanding CVE-2023-29200
This CVE involves an improper limitation of a pathname to a restricted directory ('Path Traversal').
What is CVE-2023-29200?
Contao, an open-source content management system, is affected by a path traversal vulnerability that allows logged-in users to list arbitrary system files in the file manager by manipulating the Ajax request.
The Impact of CVE-2023-29200
This vulnerability could potentially lead to unauthorized access to sensitive system files, although it does not allow the contents of these files to be read. Users of affected versions are advised to update to Contao 4.9.40, 4.13.21, or 5.1.4 to receive a patch. No known workarounds exist.
Technical Details of CVE-2023-29200
The vulnerability is rated with a CVSSv3.1 base score of 4.3 out of 10, indicating a medium severity issue with low attack complexity and network access required.
Vulnerability Description
The path traversal vulnerability in contao/core-bundle allows attackers to navigate outside of the intended directory and potentially access sensitive system files.
Affected Systems and Versions
= 2.0.0, < 4.9.40
= 4.10.0, < 4.13.21
= 5.0.0, < 5.1.4
Exploitation Mechanism
Attackers can exploit this vulnerability by manipulating the Ajax request in the file manager, allowing them to view system files they are not authorized to access.
Mitigation and Prevention
It is crucial for users to take immediate action to secure their systems and prevent potential unauthorized access.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates