In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. Issue has been patched in Build 466 (v1.0.466).
The product allows user input to control or influence paths or file names that are used in filesystem operations.
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
Link | Tags |
---|---|
https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg | third party advisory patch |
https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8 | third party advisory patch |
http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2020/Aug/2 | mailing list exploit third party advisory |