CVE-2021-32650 – october/system
Package
Manager: composer
Name: october/system
Vulnerable Version: >=1.1.0 <1.1.6 || >=0 <1.0.473
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01086 pctl0.77061
Details
october/system arbitrary code execution ### Impact Assuming an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates. ### Patches Issue has been patched in Build 473 and v1.1.6 ### Workarounds Apply https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26 to your installation manually if you are unable to upgrade. ### References Credits to: • Sushi Yushi ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
Metadata
Created: 2022-01-14T21:08:26Z
Modified: 2022-08-11T16:55:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-5hfj-r725-wpc4/GHSA-5hfj-r725-wpc4.json
CWE IDs: ["CWE-74", "CWE-94"]
Alternative ID: GHSA-5hfj-r725-wpc4
Finding: F184
Auto approve: 1