First published: Fri Apr 13 2018(Updated: )
CMS Made Simple (CMSMS) through 2.2.6 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_COOKIE[$this->_loginkey] to equal 1, because an SHA-1 cryptographic protection mechanism can be bypassed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Simple CMS | <=2.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10084 is considered a high severity vulnerability due to its ability to facilitate privilege escalation from ordinary user to admin user.
To fix CVE-2018-10084, upgrade CMS Made Simple to version 2.2.7 or later, which addresses this vulnerability.
CVE-2018-10084 affects all versions of CMS Made Simple up to and including 2.2.6.
CVE-2018-10084 is classified as a privilege escalation vulnerability.
CVE-2018-10084 is caused by a flaw in the SHA-1 cryptographic protection mechanism used to control user privileges, allowing attackers to alter a cookie value.