Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-32177: gin-vue-admin/common.vue at v2.5.3beta · flipped-aurora/gin-vue-admin

In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the ‘Normal Upload’ functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin’s cookie leading to account takeover.

CVE
#java

Permalink

<template>

<div>

<el-upload

:action="`${path}/fileUploadAndDownload/upload`"

:before-upload="checkFile"

:headers="{ 'x-token’: userStore.token }"

:on-error="uploadError"

:on-success="uploadSuccess"

:show-file-list="false"

class="upload-btn"

>

<el-button size="small" type="primary">普通上传</el-button>

</el-upload>

</div>

</template>

<script setup>

import { ref } from ‘vue’

import { ElMessage } from ‘element-plus’

import { useUserStore } from ‘@/pinia/modules/user’

const emit = defineEmits([‘on-success’])

const path = ref(import.meta.env.VITE_BASE_API)

const userStore = useUserStore()

const fullscreenLoading = ref(false)

const checkFile = (file) => {

fullscreenLoading.value = true

const isJPG = file.type === ‘image/jpeg’

const isPng = file.type === ‘image/png’

const isLt2M = file.size / 1024 / 1024 < 0.5

if (!isJPG && !isPng) {

ElMessage.error(‘上传图片只能是 jpg或png 格式!’)

fullscreenLoading.value = false

}

if (!isLt2M) {

ElMessage.error(‘未压缩未见上传图片大小不能超过 500KB,请使用压缩上传’)

fullscreenLoading.value = false

}

return (isPng || isJPG) && isLt2M

}

const uploadSuccess = (res) => {

const { data } = res

if (data.file) {

emit('on-success’, data.file.url)

}

}

const uploadError = () => {

ElMessage({

type: 'error’,

message: ‘上传失败’

})

fullscreenLoading.value = false

}

</script>

<script>

export default {

name: 'UploadCommon’,

methods: {

}

}

</script>

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda