October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.421 and before version 1.0.469, an attacker can read local files on an October CMS server via a specially crafted request. Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h | third party advisory |
https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 | third party advisory patch |