CVE-2020-5297

In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. Issue has been patched in Build 466 (v1.0.466).
Configurations

Configuration 1 (hide)

cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*

History

30 Jun 2022, 14:46

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Aug/2 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Aug/2 - Exploit, Mailing List, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html - (MISC) http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html - Exploit, Third Party Advisory, VDB Entry
CWE CWE-610

Information

Published : 2020-06-03 22:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-5297

Mitre link : CVE-2020-5297

CVE.ORG link : CVE-2020-5297


JSON object : View

Products Affected

octobercms

  • october
CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere

CWE-73

External Control of File Name or Path