An attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the cms.manage_assets
permission.
Issue has been patched in Build 466 (v1.0.466).
Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.
Reported by Sivanesh Ashok
If you have any questions or comments about this advisory:
<img width=“1108” alt=“Screen Shot 2020-03-31 at 2 37 53 PM” src=“https://user-images.githubusercontent.com/7253840/78072989-44b3ac80-735d-11ea-8676-09c69f0409c4.png”>
packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html
seclists.org/fulldisclosure/2020/Aug/2
github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc
github.com/octobercms/october/security/advisories/GHSA-r23f-c2j5-rx2f
nvd.nist.gov/vuln/detail/CVE-2020-5295