
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Camaleon CMS, a dynamic content management system based on Ruby on Rails, contains a critical arbitrary file write vulnerability (CVE-2024-46986) discovered in versions prior to 2.8.2. The vulnerability allows authenticated users to write arbitrary files to any location on the web server where Camaleon CMS is running, with the scope limited only by the underlying filesystem permissions. This security flaw was disclosed on September 18, 2024, and received a CVSS v3.1 score of 9.9 (Critical) (GitHub Advisory).
The vulnerability exists in the upload method of the MediaController, where the fileupload and folder parameters are passed to the uploadfile method without proper path validation. The application fails to properly sanitize or validate the folder parameter, allowing directory traversal through path manipulation. An attacker can use relative path sequences (../) to write files outside the intended directory structure. The vulnerability is particularly concerning as it bypasses format restrictions when the formats parameter is removed, allowing upload of arbitrary file types (GitHub Advisory, CodeQL Guide).
The vulnerability can lead to remote code execution (RCE) if an attacker successfully writes a malicious Ruby file into sensitive locations such as the config/initializers/ subfolder of the Ruby on Rails application. This could result in complete system compromise, allowing attackers to execute arbitrary code, access sensitive information, or modify system files (GitHub Advisory, Security Online).
The vulnerability has been patched in Camaleon CMS version 2.8.2. Users are strongly advised to upgrade to this version immediately. For those unable to upgrade immediately, it is recommended to implement strict input validation for file paths, normalize file paths constructed from user input, and prevent the use of directory traversal sequences such as '../' in file operations (GitHub Advisory, OWASP Guide).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”