
Cloud Vulnerability DB
A community-led vulnerabilities database
In Studio-42 elFinder version 2.1.60, a remote code execution vulnerability was discovered through file name bypass during file upload operations. The vulnerability was assigned CVE-2022-27115 and affects systems running the elFinder file manager application (NVD, CVE).
The vulnerability exists due to improper input validation on file names when uploading files through the connector.minimal.php endpoint, specifically when the software is running on Windows systems. The issue allows attackers to bypass file upload restrictions by manipulating file names with additional dots after the file extension (FortiGuard).
Successful exploitation of this vulnerability could result in arbitrary file write of unpermitted file types and, in the worst case, remote code execution on the affected system. This could potentially lead to complete system compromise, allowing remote attackers to gain control of vulnerable systems (FortiGuard).
The vulnerability has been fixed in elFinder version 2.1.61. Organizations are advised to upgrade to the latest version to mitigate this security risk (FortiGuard).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."