First published: Sun Apr 30 2017(Updated: )
Poor cryptographic salt initialization in admin/inc/template_functions.php in GetSimple CMS 3.3.13 allows a network attacker to escalate privileges to an arbitrary user or conduct CSRF attacks via calculation of a session cookie or CSRF nonce.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cagintranetworks Getsimple Cms | =3.3.13_ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8081 is considered a high-severity vulnerability due to its potential for privilege escalation and CSRF attacks.
To fix CVE-2017-8081, upgrade to a patched version of GetSimple CMS that addresses the cryptographic salt initialization issue.
CVE-2017-8081 affects users of GetSimple CMS version 3.3.13 and below.
CVE-2017-8081 can enable network attackers to escalate privileges or conduct CSRF attacks on affected systems.
For more information about CVE-2017-8081, consult the official GitHub repository or security advisory from GetSimple CMS.