GHSA-x4q7-m6fp-4v9v

Suggest an improvement
Source
https://github.com/advisories/GHSA-x4q7-m6fp-4v9v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-x4q7-m6fp-4v9v/GHSA-x4q7-m6fp-4v9v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-x4q7-m6fp-4v9v
Aliases
  • CVE-2022-35944
Published
2022-10-13T19:11:08Z
Modified
2023-11-08T04:09:53.773290Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
October CMS Safe Mode bypass leads to authenticated Remote Code Execution
Details

Impact

This vulnerability only affects installations that rely on the safe mode restriction, commonly used when providing public access to the admin panel. Assuming an attacker has access to the admin panel and permission to open the "Editor" section, they can bypass the Safe Mode (cms.safe_mode) restriction to introduce new PHP code in a CMS template using a specially crafted request.

Patches

The issue has been patched in v2.2.34 and v3.0.66

References

Credits to:

  • David Miller

For more information

If you have any questions or comments about this advisory:

Database specific
{
    "nvd_published_at": "2022-10-13T22:15:00Z",
    "github_reviewed_at": "2022-10-13T19:11:08Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-94"
    ]
}
References

Affected packages

Packagist / october/system

Package

Name
october/system
Purl
pkg:composer/october/system

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.0.0
Fixed
2.2.34

Packagist / october/system

Package

Name
october/system
Purl
pkg:composer/october/system

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.0.0
Fixed
3.0.66