Impact
This advisory affects plugins that expose the October\Rain\Database\Attach\File::fromData
as a public interface. This vulnerability does not affect vanilla installations of October CMS since this method is not exposed or used by the system internally or externally.
When the developer allows the user to specify their own filename in the fromData
method, an unauthenticated user can perform remote code execution (RCE) by exploiting a race condition in the temporary storage directory.
Patches
The issue has been patched in Build 476 (v1.0.476) and v1.1.12 and v2.2.15.
Workarounds
Apply octobercms/library@fe569f3 to your installation manually if unable to upgrade to Build 476 (v1.0.476) or v1.1.12 or v2.2.15.
References
Credits to:
- DucNT, HungTD and GiangVQ from RedTeam@VNG Security Response Center.
For more information
If you have any questions or comments about this advisory:
Impact
This advisory affects plugins that expose the
October\Rain\Database\Attach\File::fromData
as a public interface. This vulnerability does not affect vanilla installations of October CMS since this method is not exposed or used by the system internally or externally.When the developer allows the user to specify their own filename in the
fromData
method, an unauthenticated user can perform remote code execution (RCE) by exploiting a race condition in the temporary storage directory.Patches
The issue has been patched in Build 476 (v1.0.476) and v1.1.12 and v2.2.15.
Workarounds
Apply octobercms/library@fe569f3 to your installation manually if unable to upgrade to Build 476 (v1.0.476) or v1.1.12 or v2.2.15.
References
Credits to:
For more information
If you have any questions or comments about this advisory: