Server-Side Request Forgery (SSRF) Affecting camaleon_cms Open this link in a new tab package, versions >=2.1.2.0, <2.6.0.1
Attack Complexity
Low
Privileges Required
High
Scope
Changed
Confidentiality
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-RUBY-CAMALEONCMS-1759984
-
published
20 Oct 2021
-
disclosed
20 Oct 2021
-
credit
Unknown
Introduced: 20 Oct 2021
CVE-2021-25972 Open this link in a new tabHow to fix?
Upgrade camaleon_cms
to version 2.6.0.1 or higher.
Overview
camaleon_cms is a dynamic and advanced content management system based on Ruby on Rails as an alternative to Wordpress.
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) which allows attackers to read files stored in the internal server. This is because the media upload feature allows admin users to fetch media files from external URLs, where it is not validated whether these URLs are referencing localhost or internal servers.