CVE-2024-49380 Scanner

CVE-2024-49380 Scanner - OS Command Injection vulnerability in Plenti

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

15 days 7 hours

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

Plenti is a widely used static site generator known for its efficiency in building and serving websites. It is used by developers and organizations to create static websites with ease, ensuring speed and reliability for web applications.

The OS Command Injection vulnerability occurs in the `/postLocal` endpoint of Plenti, allowing malicious actors to execute arbitrary system commands. This poses significant risks, particularly in environments where Plenti is used to serve websites dynamically.

The vulnerability exploits an insecure file writing mechanism in the `/postLocal` endpoint, permitting attackers to write arbitrary files. The affected parameter `File` can be manipulated to introduce system-level commands that lead to remote code execution.

If exploited, this vulnerability can result in full system compromise. Attackers may gain unauthorized access to critical resources, exfiltrate sensitive data, and even disable services.

REFERENCES

Get started to protecting your Free Full Security Scan