EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the Craft CMS software, affecting versions 4.0.0 through 4.17.12, and 5.0.0 through 5.9.17. The vulnerabilities include a missing volume permission check in the AssetsController::actionShowInFolder method, which allows information disclosure, and a potential authenticated remote code execution vulnerability via malicious attached behavior. These vulnerabilities pose a significant business risk, as they enable attackers to enumerate asset filenames and folder structures, as well as execute arbitrary commands on the server. If exploited, these vulnerabilities could lead to sensitive volume structures being exposed and targeted follow-up attacks being launched.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the Craft CMS software, affecting versions 4.0.0 through 4.17.12, and 5.0.0 through 5.9.17. The vulnerabilities include a missing volume permission check in the AssetsController::actionShowInFolder method, which allows information disclosure, and a potential authenticated remote code execution vulnerability via malicious attached behavior. These vulnerabilities pose a significant business risk, as they enable attackers to enumerate asset filenames and folder structures, as well as execute arbitrary commands on the server. If exploited, these vulnerabilities could lead to sensitive volume structures being exposed and targeted follow-up attacks being launched.[emaillocker id="1283"]
Craft CMS software has been affected by two high-severity vulnerabilities, which pose a significant risk to business operations. If exploited, these vulnerabilities could lead to sensitive data being exposed and targeted follow-up attacks being launched. Therefore, it is essential to take immediate action to address these vulnerabilities and prevent potential security breaches.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-33m5-hqp9-97pw
https://github.com/advisories/GHSA-qrgm-p9w5-rrfw
https://github.com/advisories/GHSA-gj2p-p9m4-c8gw