Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04cHA2LTh4NHEtYzVteM026Q

Server side request forgery in C1 CMS

C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary files to zero size (effectively delete them) leading to denial of service (DoS) or altering application logic. The authenticated user may unknowingly perform the actions by visiting a specially crafted site. Patched in C1 CMS v6.12, no known workarounds exist.

Permalink: https://github.com/advisories/GHSA-8pp6-8x4q-c5mx
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04cHA2LTh4NHEtYzVteM026Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: about 1 year ago


CVSS Score: 7.6
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

Identifiers: GHSA-8pp6-8x4q-c5mx, CVE-2022-24789
References: Repository: https://github.com/Orckestra/C1-CMS-Foundation
Blast Radius: 1.0

Affected Packages

nuget:C1CMS.Assemblies
Dependent packages: 0
Dependent repositories: 0
Downloads: 72,474 total
Affected Version Ranges: <= 6.11.7982.26191
Fixed in: 6.12.8122.18346
All affected versions: 6.11.798-2.26191
All unaffected versions: