Page 5 of 29 results (0.008 seconds)

CVSS: 5.3EPSS: 2%CPEs: 2EXPL: 1

In some circumstances, Craft 2 before 2.7.10 and 3 before 3.2.6 wasn't stripping EXIF data from user-uploaded images when it was configured to do so, potentially exposing personal/geolocation data to the public. En algunas circunstancias, Craft versiones 2 anteriores a 2.7.10 y versiones 3 anteriores a 3.2.6, no estaba eliminando los datos EXIF ??de las imágenes subidas por el usuario cuando estaba configurado para hacerlo, lo que expone potencialmente al público los datos personales y de geolocalización. Craft CMS versions 2.7.9 and 3.2.5 suffers from an information disclosure vulnerability. • https://www.exploit-db.com/exploits/47343 http://packetstormsecurity.com/files/154276/Craft-CMS-2.7.9-3.2.5-Information-Disclosure.html https://github.com/craftcms/cms/blob/develop-v2/CHANGELOG-v2.md#2710---2019-07-24 https://github.com/craftcms/cms/blob/develop/CHANGELOG-v3.md#326---2019-07-23 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Craft CMS before 3.1.31 does not properly filter XML feeds and thus allowing XSS. Craft CMS antes de la versión 3.1.31 no filtra correctamente los feeds XML y por lo tanto permite XSS • https://github.com/craftcms/cms/blob/master/CHANGELOG-v3.md https://github.com/craftcms/cms/commit/6432eca59b93bcea2ca2616199e5d419447e613f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field. Craft CMS, hasta la versión 3.0.34, permite que administradores autenticados remotos lean información sensible mediante una inyección de plantillas del lado del servidor, tal y como queda demostrado con una cadena {% para craft.app.config.DB.user y craft.app.config.DB.password en el formato de URI de las opciones del sitio, lo que provoca que se muestren el nombre de usuario y la contraseña en texto claro en un campo URI. • https://github.com/craftcms/cms/blob/master/CHANGELOG-v3.md https://github.com/phuctam/Server-Side-Template-Injection-in-CraftCMS-/issues/1 • CWE-311: Missing Encryption of Sensitive Data •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Craft CMS 2.6.3000 allows remote attackers to execute arbitrary PHP code by using the "Assets->Upload files" screen and then the "Replace it" option, because this allows a .jpg file to have embedded PHP code, and then be renamed to a .php extension. Craft CMS 2.6.3000 permite que los atacantes remotos ejecuten código PHP arbitrario utilizando la pantalla "Assets->Upload files" y luego la opción "Replace it", ya que esto permite que un archivo .jpg tenga código PHP incrustado y que luego se renombre a una extensión .php. • https://github.com/Snowty/myCVE/blob/master/CraftCMS-2.6.3000/README.md • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 2

Craft CMS before 2.6.2982 allows for a potential XSS attack vector by uploading a malicious SVG file. Craft CMS anterior a versión 2.6.2982, permite un potencial vector de ataque de tipo XSS cargando un archivo SVG malicioso. • https://www.exploit-db.com/exploits/42143 https://craftcms.com/changelog#2-6-2982 https://packetstormsecurity.com/files/142851/Craft-CMS-2.6-Cross-Site-Scripting-File-Upload.html https://twitter.com/CraftCMS/status/872599894912937984 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •