First published: Tue Dec 25 2018(Updated: )
Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Craftcms Craft Cms | <=3.0.34 | |
composer/craftcms/cms | <=3.0.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20465 is a vulnerability in Craft CMS through version 3.0.34 that allows remote authenticated administrators to read sensitive information via server-side template injection.
CVE-2018-20465 works by exploiting a server-side template injection vulnerability in Craft CMS, which allows remote authenticated administrators to read sensitive information.
CVE-2018-20465 has a severity rating of 7.2 (High).
To fix CVE-2018-20465, upgrade Craft CMS to a version beyond 3.0.34.
Yes, you can find references for CVE-2018-20465 at the following links: [Link 1](https://github.com/craftcms/cms/blob/master/CHANGELOG-v3.md) and [Link 2](https://github.com/phuctam/Server-Side-Template-Injection-in-CraftCMS-/issues/1).