Headline
CVE-2021-40964: TinyFileManager Vulnerabilities
A Path Traversal vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload a file (with Admin credentials or with the CSRF vulnerability) with the “fullpath” parameter containing path traversal strings (…/ and …) in order to escape the server’s intended working directory and write malicious files onto any directory on the computer.
CVE-2021-40964
Vulnerable Product Version: All versions up to and including 2.4.6
Vulnerability Type: Relative Path Traversal (CWE-23)
Description: A Path Traversal vulnerability exists in TinyFileManager all versions up to and including 2.4.6 that allows attackers to upload a file (with Admin credentials or with the CSRF vulnerability) with the “fullpath” parameter containing path traversal strings (…/ and …\) in order to escape the server’s intended working directory and write malicious files onto any directory on the computer.
CVE-2021-40965
Vulnerable Product Version: All versions up to and including 2.4.6
Vulnerability Type: Cross-Site Request Forgery (CWE-352)
Description: A Cross-Site Request Forgery (CSRF) vulnerability exists in TinyFileManager all versions up to and including 2.4.6 that allows attackers to upload files and run OS commands by inducing the Administrator user to browse a URL controlled by an attacker.
CVE-2021-40966
Vulnerable Product Version: All versions up to and including 2.4.6
Vulnerability Type: Stored XSS (CWE-79)
Description: A Stored XSS exists in TinyFileManager All versions up to and including 2.4.6 in /tinyfilemanager.php when the server is given a file that contains HTML and javascript in its name. A malicious user can upload a file with a malicious filename containing javascript code and it will run on any user browser when they access the server.