Remote Code Execution (RCE) Affecting silverstripe/recipe-core package, versions >=4.0.0, <4.6.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.18% (57th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Remote Code Execution (RCE) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-SILVERSTRIPERECIPECORE-584912
  • published16 Jul 2020
  • disclosed16 Jul 2020
  • creditUnknown

Introduced: 16 Jul 2020

CVE-2020-9309  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade silverstripe/recipe-core to version 4.6.0 or higher.

Overview

Affected versions of this package are vulnerable to Remote Code Execution (RCE). When malicious upload contents under allowed file extensions (for example HTML code in a TXT file) are stored as protected or draft files, the MIME detection can cause browsers to execute the file contents. Uploads stored as protected or draft files are allowed by default for authorised users only, but can also be enabled through custom logic as well as modules such as silverstripe/userforms. Sites using the previously optional silverstripe/mimevalidator module can configure MIME whitelists rather than extension whitelists, and hence prevent this issue. Sites on the Common Web Platform (CWP) use this module by default, and are not affected.

References

CVSS Scores

version 3.1