Описание
Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS
When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-2304
- https://github.com/owen2345/camaleon-cms/pull/1109
- https://github.com/owen2345/camaleon-cms/commit/179fd6b1ecf258d3e214aebfa87ac4a322ea4db4
- https://github.com/owen2345/camaleon-cms/releases/tag/2.9.1
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/camaleon_cms/CVE-2025-2304.yml
- https://www.tenable.com/security/research/tra-2025-09
Пакеты
Наименование
camaleon_cms
rubygems
Затронутые версииВерсия исправления
< 2.9.1
2.9.1
Связанные уязвимости
nvd
11 месяцев назад
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.