CVE-2022-24789

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24789
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24789.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24789
Aliases
Withdrawn
2024-05-15T05:32:03.381535Z
Published
2022-03-28T22:15:09Z
Modified
2024-05-19T02:24:07.331390Z
Severity
  • 7.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H CVSS Calculator
Summary
[none]
Details

C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary files to zero size (effectively delete them) leading to denial of service (DoS) or altering application logic. The authenticated user may unknowingly perform the actions by visiting a specially crafted site. Patched in C1 CMS v6.12, no known workarounds exist.

References

Affected packages

Git / github.com/orckestra/c1-cms-foundation

Affected ranges

Type
GIT
Repo
https://github.com/orckestra/c1-cms-foundation
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*

5.2

Other

untagged-6de0a98504a30583647e

v2.*

v2.0
v2.1
v2.1.1

v3.*

v3.0
v3.1
v3.2

v4.*

v4.0
v4.1
v4.2
v4.2-update.1
v4.3

v5.*

v5.0
v5.0-beta.1
v5.1
v5.3
v5.4
v5.5

v6.*

v6.0
v6.1
v6.10
v6.11
v6.2
v6.3
v6.4
v6.5
v6.6
v6.7
v6.8
v6.9