Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field.
References
Link | Resource |
---|---|
https://github.com/craftcms/cms/blob/master/CHANGELOG-v3.md | Release Notes |
https://github.com/phuctam/Server-Side-Template-Injection-in-CraftCMS-/issues/1 | Exploit Third Party Advisory |
https://github.com/craftcms/cms/blob/master/CHANGELOG-v3.md | Release Notes |
https://github.com/phuctam/Server-Side-Template-Injection-in-CraftCMS-/issues/1 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/craftcms/cms/blob/master/CHANGELOG-v3.md - Release Notes | |
References | () https://github.com/phuctam/Server-Side-Template-Injection-in-CraftCMS-/issues/1 - Exploit, Third Party Advisory |
Information
Published : 2018-12-25 23:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20465
Mitre link : CVE-2018-20465
CVE.ORG link : CVE-2018-20465
JSON object : View
Products Affected
craftcms
- craft_cms
CWE
CWE-311
Missing Encryption of Sensitive Data