CVE-2024-56145

Scores

EPSS

0.939high93.9%
0%20%40%60%80%100%

Percentile: 93.9%

CVSS

9.3critical4.0
0246810

CVSS Score: 9.3/10

All CVSS Scores

CVSS 4.0
9.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has register_argc_argv enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable register_argc_argv to mitigate the issue.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesnvd

CWEs

CWE-94

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-56145

Source: github-poc

URL: https://github.com/hmhlol/craft-cms-RCE-CVE-2024-56145

Vulnerable Software (2)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:php:*:*",          "versionEndExcluding": "4.13.2",          "versionStartIncludi...

Source: anchore_overrides

Type: Configuration

Vendor: *

Product: craft_cms

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*",      "versionEndExcluding": "3.9.14",      "versionStartIncluding": "3.0.0",      "vulnerable": true    }...

Source: nvd

End of list