Impact
An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the cms.manage_assets
permission.
Patches
Issue has been patched in Build 466 (v1.0.466).
Workarounds
Apply octobercms/october@6711dae to your installation manually if unable to upgrade to Build 466.
References
Reported by Sivanesh Ashok
For more information
If you have any questions or comments about this advisory:
Threat assessment:
### References
- https://github.com/octobercms/october/security/advisories/
GHSA-9722-rr68-rfpg
- https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8
- https://nvd.nist.gov/vuln/detail/
CVE-2020-5297
- http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
- http://seclists.org/fulldisclosure/2020/Aug/2
Impact
An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the
cms.manage_assets
permission.Patches
Issue has been patched in Build 466 (v1.0.466).
Workarounds
Apply octobercms/october@6711dae to your installation manually if unable to upgrade to Build 466.
References
Reported by Sivanesh Ashok
For more information
If you have any questions or comments about this advisory:
Threat assessment:
### References - https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg - https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8 - https://nvd.nist.gov/vuln/detail/CVE-2020-5297 - http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html - http://seclists.org/fulldisclosure/2020/Aug/2