
Cloud Vulnerability DB
A community-led vulnerabilities database
Contao, an open source content management system, disclosed a directory traversal vulnerability (CVE-2023-29200) on April 25, 2023. The vulnerability affected multiple versions prior to 4.9.40, 4.13.21, and 5.1.4, allowing authenticated back-end users to list arbitrary system files outside the document root in the file manager (Contao Advisory, GitHub Advisory).
The vulnerability is classified as CWE-22 (Path Traversal) with a CVSS v3.1 base score of 4.3 (Moderate). The attack vector is Network-based (AV:N), with Low attack complexity (AC:L), requiring Low privileges (PR:L), and No user interaction (UI:N). The scope is Unchanged (S:U), with Low impact on confidentiality (C:L) and No impact on integrity (I:N) and availability (A:N) (GitHub Advisory).
While authenticated users can list files outside the document root in the file manager, it's important to note that the vulnerability does not allow reading the contents of these files, limiting its potential impact (Contao Advisory).
The recommended solution is to upgrade to Contao versions 4.9.40, 4.13.21, or 5.1.4. No alternative workarounds are available (Contao Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."