Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q22j-5r3g-9hmh

Опубликовано: 29 нояб. 2023
Источник: github
Github: Прошло ревью
CVSS3: 4.9

Описание

October CMS safe mode bypass using Page template injection

Impact

An authenticated backend user with the editor.cms_pages, editor.cms_layouts, or editor.cms_partials permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to cms.safe_mode being enabled can craft a special request to include PHP code in the CMS template.

This is not a problem for anyone who trusts their users with those permissions to usually write & manage PHP within the CMS by not having cms.safe_mode enabled. Still, it would be a problem for anyone relying on cms.safe_mode to ensure that users with those permissions in production do not have access to write and execute arbitrary PHP.

Patches

This issue has been patched in v3.4.15.

Workarounds

As a workaround, remove the specified permissions from untrusted users.

References

Credits to:

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

october/system

composer
Затронутые версииВерсия исправления

>= 3.0.0, < 3.4.15

3.4.15

EPSS

Процентиль: 39%
0.00175
Низкий

4.9 Medium

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 4.9
nvd
около 2 лет назад

October is a Content Management System (CMS) and web platform to assist with development workflow. An authenticated backend user with the `editor.cms_pages`, `editor.cms_layouts`, or `editor.cms_partials` permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to `cms.safe_mode` being enabled can craft a special request to include PHP code in the CMS template. This issue has been patched in version 3.4.15.

EPSS

Процентиль: 39%
0.00175
Низкий

4.9 Medium

CVSS3

Дефекты

CWE-94