CVE-2024-7928

MEDIUM EXPLOITED NUCLEI

Fastadmin < 1.3.4.20220530 - Path Traversal

Title source: rule

Description

A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.

Exploits (6)

nomisec WORKING POC 69 stars
by bigb0x · remote
https://github.com/bigb0x/CVE-2024-7928
nomisec WORKING POC 9 stars
by gh-ost00 · infoleak
https://github.com/gh-ost00/CVE-2024-7928
nomisec WORKING POC 2 stars
by th3gokul · infoleak
https://github.com/th3gokul/CVE-2024-7928
nomisec WORKING POC
by w666-glitch · poc
https://github.com/w666-glitch/CVE-2024-7928
nomisec WORKING POC
by wh6amiGit · remote
https://github.com/wh6amiGit/CVE-2024-7928
inthewild WORKING POC
poc
https://github.com/fa-rrel/cve-2024-7928

Nuclei Templates (1)

FastAdmin < V1.3.4.20220530 - Path Traversal
MEDIUMby s4e-io,Hel10-Web
FOFA: icon_hash="-1036943727"

Scores

CVSS v3 4.3
EPSS 0.9180
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

VulnCheck KEV 2024-08-29
CWE
CWE-22
Status published
Products (1)
fastadmin/fastadmin < 1.3.4.20220530
Published Aug 19, 2024
Tracked Since Feb 18, 2026