CVE-2024-46986: Arbitrary file write leading to RCE in Camaleon CMS

10.0 CVSS

Description

Camaleon CMS is a dynamic and advanced content management system based on Ruby on Rails. An arbitrary file write vulnerability accessible via the upload method of the MediaController allows authenticated users to write arbitrary files to any location on the web server Camaleon CMS is running on (depending on the permissions of the underlying filesystem). E.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. This issue has been addressed in release version 2.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Classification

CVE ID: CVE-2024-46986

CVSS Base Severity: CRITICAL

CVSS Base Score: 10.0

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem Types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Affected Products

Vendor: owen2345

Product: camaleon-cms

Nuclei Template

http/cves/2024/CVE-2024-46986.yaml

Exploit Prediction Scoring System (EPSS)

EPSS Score: 86.38% (probability of being exploited)

EPSS Percentile: 99.34% (scored less or equal to compared to others)

EPSS Date: 2025-04-18 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-46986
https://github.com/owen2345/camaleon-cms/security/advisories/GHSA-wmjg-vqhv-q5p5
https://codeql.github.com/codeql-query-help/ruby/rb-path-injection
https://owasp.org/www-community/attacks/Path_Traversal
https://securitylab.github.com/advisories/GHSL-2024-182_GHSL-2024-186_Camaleon_CMS
https://www.reddit.com/r/rails/comments/1exwtdm/camaleon_cms_281_has_been_released

Timeline