First published: Tue Mar 20 2018(Updated: )
** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in system/workplace/admin/accounts/user_role.jsp in OpenCMS 10.5.3 allows remote attackers to hijack the authentication of administrative users for requests that perform privilege escalation. Note: It is argued that OpenCMS allows only registered users to upload different kind of content artifacts (SVG, .doc, .docx). The uploaded content is stored in the CMS content repository "as is". In case of scripts inside an SVG, this may or may not be "malicious", there is no way of knowing if the uploaded SVG contains the script for a reason. To exploit the "issue", a user must have an account in the CMS as a content manager.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alkacon OpenCMS | =10.5.3 | |
=10.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8811 is considered a moderate severity vulnerability that can lead to privilege escalation through CSRF attacks.
To fix CVE-2018-8811, ensure that OpenCMS is updated to a version that addresses the CSRF vulnerability.
CVE-2018-8811 primarily affects OpenCMS version 10.5.3 installed on user workstations.
CVE-2018-8811 involves a Cross-site request forgery (CSRF) attack that allows remote attackers to hijack administrative user authentication.
CVE-2018-8811 has been reported, but there is no definitive evidence that it is widely exploited in the wild.