// For flags

CVE-2019-19374

Squiz Matrix CMS 5.5.x.x Code Execution / Information Disclosure

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in core/assets/form/form_question_types/form_question_type_file_upload/form_question_type_file_upload.inc in Squiz Matrix CMS 5.5.0 prior to 5.5.0.3, 5.5.1 prior to 5.5.1.8, 5.5.2 prior to 5.5.2.4, and 5.5.3 prior to 5.5.3.3 where a user can delete arbitrary files from the server during interaction with the File Upload field type, when a custom form exists. (This is related to an information disclosure issue within the File Upload field type that allows users to view the full path to uploaded files, including the product's web root directory.)

Se detectó un problema en el archivo core/assets/form/form_question_types/form_question_type_file_upload/form_question_type_file_upload.inc en Squiz Matrix CMS, versiones 5.5.0 anteriores a 5.5.0.3, versiones 5.5.1 anteriores a 5.5.1.8, versiones 5.5.2 anteriores a 5.5.2.4, y versiones 5.5.3 anteriores a 5.5.3.3 donde un usuario puede eliminar archivos arbitrarios del servidor durante la interacción con el tipo de campo File Upload, cuando existe un formulario personalizado. (Esto está relacionado con un problema de divulgación de información dentro del tipo de campo File Upload que permite a usuarios visualizar la ruta completa a los archivos cargados, incluyendo el directorio root web del producto).

Squiz Matrix CMS suffers from PHP unserialization code execution, information disclosure, and arbitrary file deletion vulnerabilities.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-11-28 CVE Reserved
  • 2019-12-11 CVE Published
  • 2024-05-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Squiz
Search vendor "Squiz"
Matrix
Search vendor "Squiz" for product "Matrix"
>= 5.5.0.0 < 5.5.0.3
Search vendor "Squiz" for product "Matrix" and version " >= 5.5.0.0 < 5.5.0.3"
-
Affected
Squiz
Search vendor "Squiz"
Matrix
Search vendor "Squiz" for product "Matrix"
>= 5.5.1.0 < 5.5.1.8
Search vendor "Squiz" for product "Matrix" and version " >= 5.5.1.0 < 5.5.1.8"
-
Affected
Squiz
Search vendor "Squiz"
Matrix
Search vendor "Squiz" for product "Matrix"
>= 5.5.2.0 < 5.5.2.4
Search vendor "Squiz" for product "Matrix" and version " >= 5.5.2.0 < 5.5.2.4"
-
Affected
Squiz
Search vendor "Squiz"
Matrix
Search vendor "Squiz" for product "Matrix"
>= 5.5.3.0 < 5.5.3.3
Search vendor "Squiz" for product "Matrix" and version " >= 5.5.3.0 < 5.5.3.3"
-
Affected