CVE-2022-24789

Source
https://cve.org/CVERecord?id=CVE-2022-24789
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24789.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24789
Aliases
Published
2022-03-28T21:45:13Z
Modified
2025-12-04T10:18:09.691626Z
Severity
  • 7.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H CVSS Calculator
Summary
Deserialization of untrusted data in C1 CMS.
Details

C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary files to zero size (effectively delete them) leading to denial of service (DoS) or altering application logic. The authenticated user may unknowingly perform the actions by visiting a specially crafted site. Patched in C1 CMS v6.12, no known workarounds exist.

Database specific
{
    "cwe_ids": [
        "CWE-918"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24789.json"
}
References

Affected packages

Git / github.com/orckestra/c1-cms-foundation

Affected ranges

Type
GIT
Repo
https://github.com/orckestra/c1-cms-foundation
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*
5.2
Other
untagged-6de0a98504a30583647e
v2.*
v2.0
v2.1
v2.1.1
v3.*
v3.0
v3.1
v3.2
v4.*
v4.0
v4.1
v4.2
v4.2-update.1
v4.3
v5.*
v5.0
v5.0-beta.1
v5.1
v5.3
v5.4
v5.5
v6.*
v6.0
v6.1
v6.10
v6.11
v6.2
v6.3
v6.4
v6.5
v6.6
v6.7
v6.8
v6.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24789.json"