CVE-2019-9889
low-risk
Published 2019-03-21
In Vanilla before 2.6.4, a flaw exists within the getSingleIndex function of the AddonManager class. The issue results in a require call using a crafted type value, leading to Directory Traversal with File Inclusion. An attacker can leverage this vulnerability to execute code under the context of the web server.
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.7/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Vanilla
Affected Vendors
References (6)
Third Party Advisory
https://github.com/vanilla/vanilla/compare/b043ae8...9f12b22
Third Party Advisory
https://github.com/vanilla/vanilla/pull/7840
Third Party Advisory
https://github.com/vanilla/vanilla/compare/b043ae8...9f12b22
Third Party Advisory
https://github.com/vanilla/vanilla/pull/7840
21
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal