logo

CVE-2021-32649 october/system

Package

Manager: composer
Name: october/system
Vulnerable Version: >=1.1.0 <1.1.6 || >=0 <1.0.473

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.005 pctl0.64961

Details

October/System authenticated file write leads to remote code execution ### Impact Assuming an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup. ### Patches Issue has been patched in Build 473 and v1.1.6 ### Workarounds Apply https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26 to your installation manually if you are unable to upgrade. ### References Credits to: • David Miller ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)

Metadata

Created: 2022-01-14T21:08:23Z
Modified: 2022-08-11T16:54:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-wv23-pfj7-2mjj/GHSA-wv23-pfj7-2mjj.json
CWE IDs: ["CWE-74", "CWE-94"]
Alternative ID: GHSA-wv23-pfj7-2mjj
Finding: F184
Auto approve: 1