logo

CVE-2022-24800 october/system

Package

Manager: composer
Name: october/system
Vulnerable Version: >=0 <1.0.476 || >=1.1.0 <1.1.12 || >=2.0.0 <2.2.15

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.02925 pctl0.85877

Details

October CMS upload process vulnerable to RCE via Race Condition ### Impact This advisory affects plugins that expose the `October\Rain\Database\Attach\File::fromData` as a public interface. This vulnerability does not affect vanilla installations of October CMS since this method is not exposed or used by the system internally or externally. When the developer allows the user to specify their own filename in the `fromData` method, an unauthenticated user can perform remote code execution (RCE) by exploiting a race condition in the temporary storage directory. ### Patches The issue has been patched in Build 476 (v1.0.476) and v1.1.12 and v2.2.15. ### Workarounds Apply https://github.com/octobercms/library/commit/fe569f3babf3f593be2b1e0a4ae0283506127a83 to your installation manually if unable to upgrade to Build 476 (v1.0.476) or v1.1.12 or v2.2.15. ### References Credits to: - DucNT, HungTD and GiangVQ from RedTeam@VNG Security Response Center. ### For more information If you have any questions or comments about this advisory: - Email us at [hello@octobercms.com](mailto:hello@octobercms.com)

Metadata

Created: 2022-07-13T21:42:45Z
Modified: 2022-07-21T15:56:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-8v7h-cpc2-r8jp/GHSA-8v7h-cpc2-r8jp.json
CWE IDs: ["CWE-362"]
Alternative ID: GHSA-8v7h-cpc2-r8jp
Finding: F124
Auto approve: 1