CVE-2023-28459: pretalx vulnerable to path traversal in HTML export
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.49385%
CWE
Published
4/20/2023
Updated
10/21/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pretalx | pip | < 2.3.2 | 2.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows critical security checks were added to both functions:
- In dump_content: Added path.resolve() and parent directory validation to prevent traversal
- In get_mediastatic_content: Added path resolution and containment checks for MEDIA/STATIC_ROOT These changes directly address CWE-22 (Path Traversal). The Sonar blog explicitly describes how these functions processed attacker-controlled paths without proper validation, enabling file read/write primitives. The vulnerability documentation and patch context leave no ambiguity about their role in the exploit chain.