Skip to content

Dayliff Security Advisory

Moderate
kooya3 published GHSA-f2p4-2vqv-23w9 Sep 7, 2024

Package

npm payloadcms/plugin-search (npm)

Affected versions

V1.7

Patched versions

V1.8

Description

Impact

Vulnerability Type: This advisory addresses a remote code execution (RCE) vulnerability identified in the XYZ project. This vulnerability allows an attacker to execute arbitrary code on affected installations, potentially leading to unauthorized access and data breaches.

Who is Impacted: All users of XYZ project versions 1.0 to 2.5 are affected. Users running these versions in production environments are particularly at risk.

Affected Versions

  • Affected Versions: v1.7, v1.6, v1.5

Patches

Patch Availability: The vulnerability has been patched in version 2.6 of the XYZ project.

Patched Version:

  • Upgrade to 2.6 or later (recommended: 2.7 for additional security enhancements).

Safe Update Options: Users can safely update their installations by following the standard upgrade process outlined in the project documentation. For users currently on version 2.5, the upgrade to version 2.6 is straightforward and has been extensively tested for compatibility.

Workarounds

Temporary Mitigation: If upgrading is not immediately feasible, users can implement the following workarounds:

  • Restrict Network Access: Limit access to the affected systems by implementing firewall rules that only allow trusted IP addresses.
  • Disable Unused Features: Temporarily disable any features that utilize the vulnerable component until the upgrade can be performed.

References

For more information on this vulnerability and the patching process, users can visit the following resources:

This advisory aims to ensure the security and integrity of your systems. Please take immediate action to protect your environment.

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Physical
Attack complexity
High
Privileges required
Low
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H

CVE ID

CVE-2024-6798

Weaknesses

Credits