Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2023-40035
Summary
Craft is a CMS for creating custom digital experiences on the web and beyond. Bypassing the "validatePath" function can lead to potential remote code execution. This vulnerability can lead to malicious control of vulnerable systems and data exfiltrations. Although the vulnerability is exploitable only in the authenticated users, configuration with "ALLOW_ADMIN_CHANGES=true", there is still a potential security threat (Remote Code Execution). This issue affects craftcms/cms in version 3.0.x prior to 3.8.15, and 4.0.x prior to 4.4.15.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- HIGH
- HIGH
- HIGH
CWE-74 - Injection
Listed as the number one web application security risk on the 'OWASP Top Ten', injection attacks are widespread and dangerous, especially in legacy applications. Injection attacks are a class of vulnerabilities in which an attacker injects untrusted data into a web application that gets processed by an interpreter, altering the program's execution. This can result in data loss/theft, loss of data integrity, denial of service, and even compromising the entire system.
References
Advisory Timeline
- Published