Orckestra C1 CMS's deserialization of untrusted data allows for arbitrary code execution.
Critical severity
GitHub Reviewed
Published
Sep 27, 2022
in
Orckestra/C1-CMS-Foundation
•
Updated Apr 3, 2023
Description
Published by the National Vulnerability Database
Sep 27, 2022
Published to the GitHub Advisory Database
Sep 30, 2022
Reviewed
Sep 30, 2022
Last updated
Apr 3, 2023
Impact
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS.
Authentication is required to exploit this vulnerability.
The authenticated user may perform the actions unknowingly by visiting a specially crafted site.
Patches
Patched in C1 CMS v6.13
Workarounds
Upgrade to C1 CMS v6.13 or newer is required
Credit
This issue was discovered and reported by Markus Wulftange / Code White GmbH.
References