CVE-2024-45391

High
|7.5
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

An attacker could potentially access sensitive search tokens from the lock file of websites using the Tina CMS command line interface before version 1.6.2, which could allow them to manipulate or access restricted content. If your site uses search functionality, it's crucial to upgrade to the latest version and change your search token immediately to prevent exploitation.

Technical Description

Tina is an open-source content management system (CMS). Sites building with Tina CMS's command line interface (CLI) prior to version 1.6.2 that use a search token may be vulnerable to the search token being leaked via lock file (tina-lock.json). Administrators of Tina-enabled websites with search setup should rotate their key immediately. This issue has been patched in @tinacms/cli version 1.6.2. Upgrading and rotating the search token is required for the proper fix.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References