CVE-2020-5296: External Control of File Name or Path
(updated )
In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the cms.manage_assets
permission. Issue has been patched in Build 466 (v1.0.466).
References
- packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
- seclists.org/fulldisclosure/2020/Aug/2
- github.com/advisories/GHSA-jv6v-fvvx-4932
- github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc
- github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932
- nvd.nist.gov/vuln/detail/CVE-2020-5296
Detect and mitigate CVE-2020-5296 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →