Lucene search

K
githubGitHub Advisory DatabaseGHSA-HMQJ-GV2M-HQ55
HistoryOct 26, 2023 - 8:47 p.m.

baserCMS Directory Traversal vulnerability in Form submission data management Feature

2023-10-2620:47:57
CWE-22
GitHub Advisory Database
github.com
21
basercms
directory traversal
form submission
vulnerability
information management
server
update
security

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

35.8%

There is a Directory Traversal Vulnerability in Form submission data management Feature to baserCMS.

This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.

Target

baserCMS 4.7.8 and earlier versions

Vulnerability

There is a possibility that information on the server may be obtained by a user who is logged in to the management screen.

Countermeasures

Update to the latest version of baserCMS

Please refer to the following page to reference for more information.
https://basercms.net/security/JVN_45547161

Credits

Shiga Takuma@BroadBand Security, Inc

Affected configurations

Vulners
Node
baserprojectbasercmsRange<4.8.0
VendorProductVersionCPE
baserprojectbasercms*cpe:2.3:a:baserproject:basercms:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

35.8%