First published: Sun Nov 12 2017(Updated: )
In CMS Made Simple 2.2.3.1, the is_file_acceptable function in modules/FileManager/action.upload.php only blocks file extensions that begin or end with a "php" substring, which allows remote attackers to bypass intended access restrictions or trigger XSS via other extensions, as demonstrated by .phtml, .pht, .html, or .svg.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CMS Made Simple | =2.2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16798 has a medium severity rating as it allows remote attackers to bypass access restrictions.
To fix CVE-2017-16798, update CMS Made Simple to a version that addresses this vulnerability.
CVE-2017-16798 allows remote attackers to trigger XSS attacks through unsupported file extensions.
CVE-2017-16798 affects CMS Made Simple version 2.2.3.1.
The vulnerable function in CVE-2017-16798 is is_file_acceptable located in modules/FileManager/action.upload.php.