
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-39345 is a path traversal vulnerability discovered in gin-vue-admin versions prior to 2.5.4. The vulnerability was reported on October 23, 2022, and affects the plugin installation functionality of the application. The issue allows attackers to perform arbitrary file uploads through directory traversal attacks (GitHub Advisory).
The vulnerability exists in the plugin installation function where users can download and upload zip packages from the plugin market. The issue stems from insufficient validation in the utils.Unzip method, which automatically decompresses uploaded files without proper path validation. The vulnerability is classified under CWE-22 and CWE-23, relating to path traversal. The flaw is specifically located in the server/service/system/sys_auto_code.go file at line 880 (GitHub Advisory).
When exploited, this vulnerability allows malicious attackers to upload specially crafted zip packages that can traverse directories and upload or overwrite arbitrary files on the server side. This could potentially lead to remote code execution if server-side script files are uploaded (GitHub Advisory).
The vulnerability has been patched in version 2.5.4 of gin-vue-admin. Users are advised to upgrade to this version or later to mitigate the risk. The fix was implemented through pull request #1264 (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."