CVE-2020-5297: External Control of File Name or Path
(updated )
In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the cms.manage_assets
permission. Issue has been patched in Build 466 (v1.0.466).
References
- packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
- seclists.org/fulldisclosure/2020/Aug/2
- github.com/advisories/GHSA-9722-rr68-rfpg
- github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8
- github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg
- nvd.nist.gov/vuln/detail/CVE-2020-5297
Detect and mitigate CVE-2020-5297 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →