An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the cms.manage_assets
permission.
Issue has been patched in Build 466 (v1.0.466).
Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.
Reported by Sivanesh Ashok
If you have any questions or comments about this advisory:
<img width=“1241” alt=“Screen Shot 2020-03-31 at 12 16 53 PM” src=“https://user-images.githubusercontent.com/7253840/78060872-89354d00-7349-11ea-8c2b-5881b0a50736.png”>
packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
seclists.org/fulldisclosure/2020/Aug/2
github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc
github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932
nvd.nist.gov/vuln/detail/CVE-2020-5296