October Backend vulnerabilities

7 known vulnerabilities affecting october/backend.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
MEDIUM2LOW5

Vulnerabilities

Page 1 of 1
CVE-2021-21265LOW≥ 0, < 1.1.22021-03-10
CVE-2021-21265 [LOW] CWE-644 October CMS vulnerable to Potential Host Header Poisoning on misconfigured servers October CMS vulnerable to Potential Host Header Poisoning on misconfigured servers ### Impact When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on
ghsaosv
CVE-2020-15248LOW≥ 1.0.319, < 1.0.4702020-11-23
CVE-2020-15248 [LOW] CWE-269 Privilege escalation by backend users assigned to the default "Publisher" system role Privilege escalation by backend users assigned to the default "Publisher" system role ### Impact Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. ### Patches Issue has been patch
ghsaosv
CVE-2020-15249LOW≥ 1.0.319, < 1.0.4692020-11-23
CVE-2020-15249 [LOW] CWE-79 Stored XSS by authenticated backend user with access to upload files Stored XSS by authenticated backend user with access to upload files ### Impact Backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain (i.e. /stora
ghsaosv
CVE-2020-11083LOW≥ 1.0.319, < 1.0.4662020-08-05
CVE-2020-11083 [LOW] CWE-79 Stored XSS in October Stored XSS in October ### Impact A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field. ### Patches Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` per
ghsaosv
CVE-2020-4061LOW≥ 1.0.319, < 1.0.4672020-07-02
CVE-2020-4061 [LOW] CWE-79 Cross-site Scripting in October Cross-site Scripting in October ### Impact Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack. ### Patches Issue has been patched in Build 467 (v1.0.467). ### Workarounds Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installation manually if unable to upgrade to Build 467. ### References - https://research.securit
ghsaosv
CVE-2020-5298MEDIUM≥ 1.0.319, < 1.0.4662020-06-03
CVE-2020-5298 [MEDIUM] CWE-79 Reflected XSS when importing CSV in OctoberCMS Reflected XSS when importing CSV in OctoberCMS ### Impact A user with the ability to use the import functionality of the `ImportExportController` behavior could be socially engineered by an attacker to upload a maliciously crafted CSV file which could result in a reflected XSS attack on the user in question ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms
ghsaosv
CVE-2020-5299MEDIUM≥ 1.0.319, < 1.0.4662020-06-03
CVE-2020-5299 [MEDIUM] CWE-77 Potential CSV Injection vector in OctoberCMS Potential CSV Injection vector in OctoberCMS ### Impact Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successful attack can be completed: 1. Have found a vulnerability i
ghsaosv