Vulnerability DatabaseGHSA-3hp8-6j24-m5gm

GHSA-3hp8-6j24-m5gm
Ruby vulnerability analysis and mitigation

Overview

A critical vulnerability was discovered in Camaleon CMS affecting versions prior to 2.8.1, identified as GHSA-3hp8-6j24-m5gm. The vulnerability exists in the MediaController class where path traversal checks are not properly implemented, potentially allowing arbitrary file deletion on the server hosting Camaleon CMS. This security issue was published on September 23, 2024, and affects the bundler package camaleon_cms on RubyGems (GitHub Advisory).

Technical details

The vulnerability stems from insufficient path validation in the MediaController class's actions method. When handling media actions, particularly the 'delfile' action, the system fails to verify if the given path is within the intended media folder boundary. The vulnerability involves the deletefile method of the CamaleonCmsLocalUploader class, where file paths are joined with the root folder without proper validation. The CVSS v3 score for this vulnerability is 7.2, indicating high severity (Ruby Advisory).

Impact

The exploitation of this vulnerability could lead to unauthorized file deletion across the server hosting Camaleon CMS. An attacker with administrator account access could potentially delete arbitrary files or folders on the server. Additionally, the crop_url action might enable arbitrary file writes, though this functionality appears to be currently non-functional (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 2.8.1 of Camaleon CMS. The recommended remediation includes normalizing all file paths constructed from untrusted user input and implementing checks to ensure the resulting path remains within the targeted directory. Additionally, character sequences such as '..' should be blocked in untrusted input used for path construction (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-4249-gjr8-jpq3HIGH8.7
  • RubyRuby
  • prosemirror_to_html
NoYesNov 13, 2025
CVE-2025-64501HIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 10, 2025
GHSA-vfpf-xmwh-8m65HIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 07, 2025
GHSA-52c5-vh7f-26fxHIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 06, 2025
CVE-2025-12790HIGH7.4
  • RubyRuby
  • mqtt
NoYesNov 06, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management