logo

CVE-2017-1000490 mautic/core

Package

Manager: composer
Name: mautic/core
Vulnerable Version: >=1.0.0 <2.12.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00344 pctl0.56269

Details

Mautic users able to download any files from server using filemanager ### Impact Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to. ### Patches Update to 2.12.0 or later. ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)

Metadata

Created: 2021-01-19T20:50:38Z
Modified: 2023-09-11T13:40:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/01/GHSA-qpgw-2c72-4c89/GHSA-qpgw-2c72-4c89.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-qpgw-2c72-4c89
Finding: F063
Auto approve: 1