// For flags

CVE-2020-15249

Stored XSS by authenticated backend user with access to upload files

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.469, backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain (i.e. /storage/app/media/evil.svg), but they would have to convince their target to visit that location directly in the target's browser as the backend does not display SVGs inline anywhere, SVGs are only displayed as image resources in the backend and are thus unable to be executed. Issue has been patched in Build 469 (v1.0.469) & v1.1.0.

October es una plataforma CMS gratuita, de código abierto y autohosteada basada en Laravel PHP Framework. En October CMS desde la versión 1.0.319 y anterior a versión 1.0.469, a los usuarios de backend con acceso para cargar archivos se les permitió cargar archivos SVG sin ningún saneamiento aplicado a los archivos cargados. Dado que los archivos SVG admiten ser analizados como HTML por los navegadores, esto significa que teóricamente podrían cargar Javascript que se ejecutaría en una ruta bajo el dominio del sitio web (es decir, /storage/app/media/evil.svg), pero tendrían que convencer su objetivo para que visite esa ubicación directamente en el navegador del objetivo, ya que el backend no muestra SVG en línea en ningún lugar, los SVG solo se muestran como recursos de imagen en el backend y, por lo tanto, no se pueden ejecutar. El problema se ha corregido en Build 469 (versión v1.0.469) y versión v1.1.0

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-06-25 CVE Reserved
  • 2020-11-23 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Octobercms
Search vendor "Octobercms"
October
Search vendor "Octobercms" for product "October"
>= 1.0.319 < 1.0.469
Search vendor "Octobercms" for product "October" and version " >= 1.0.319 < 1.0.469"
-
Affected