[Bugs] [Bug 13499] New: [CVE 21] bolt 0.9.4 CVEs found
bugzilla
bugzilla на rosalinux.ru
Ср Авг 23 23:18:01 MSK 2023
https://bugzilla.rosalinux.ru/show_bug.cgi?id=13499
Platform: 2021.1
Bug ID: 13499
Summary: [CVE 21] bolt 0.9.4 CVEs found
Classification: ROSA-based products
Product: ROSA Fresh
Version: All
Hardware: All
URL: CVE-2019-15483, CVE-2019-15484, CVE-2019-15485,
CVE-2019-9185, CVE-2020-28925, CVE-2020-4040,
CVE-2020-4041, CVE-2021-27367,
OS: Linux
Status: CONFIRMED
Severity: normal
Priority: Normal
Component: System (kernel, glibc, systemd, bash, PAM...)
Assignee: bugs на lists.rosalinux.ru
Reporter: y.tumanov на rosalinux.ru
QA Contact: bugs на lists.rosalinux.ru
CC: e.kosachev на rosalinux.ru, s.matveev на rosalinux.ru,
y.tumanov на rosalinux.ru
Target Milestone: ---
Flags: secteam_verified?
Please patch CVEs for package bolt version 0.9.4
INFO (CVEs are): bolt 0.9.4
cves found
CVE-2019-15483
Desc: Bolt before 3.6.10 has XSS via a title that is mishandled in the system
log.
Link: https://nvd.nist.gov/vuln/detail/CVE-2019-15483
Severity: MEDIUM
CVE-2019-15484
Desc: Bolt before 3.6.10 has XSS via an image's alt or title field.
Link: https://nvd.nist.gov/vuln/detail/CVE-2019-15484
Severity: MEDIUM
CVE-2019-15485
Desc: Bolt before 3.6.10 has XSS via createFolder or createFile in
Controller/Async/FilesystemManager.php.
Link: https://nvd.nist.gov/vuln/detail/CVE-2019-15485
Severity: MEDIUM
CVE-2019-9185
Desc: Controller/Async/FilesystemManager.php in the filemanager in Bolt before
3.6.5 allows remote attackers to execute arbitrary PHP code by renaming a
previously uploaded file to have a .php extension.
Link: https://nvd.nist.gov/vuln/detail/CVE-2019-9185
Severity: HIGH
CVE-2020-28925
Desc: Bolt before 3.7.2 does not restrict filter options in a Request in the
Twig context, and is therefore inconsistent with the "How to Harden Your PHP
for Better Security" guidance.
Link: https://nvd.nist.gov/vuln/detail/CVE-2020-28925
Severity: MEDIUM
CVE-2020-4040
Desc: Bolt CMS before version 3.7.1 lacked CSRF protection in the preview
generating endpoint. Previews are intended to be generated by the admins,
developers, chief-editors, and editors, who are authorized to create content in
the application. But due to lack of proper CSRF protection, unauthorized users
could generate a preview. This has been fixed in Bolt 3.7.1
Link: https://nvd.nist.gov/vuln/detail/CVE-2020-4040
Severity: MEDIUM
CVE-2020-4041
Desc: In Bolt CMS before version 3.7.1, the filename of uploaded files was
vulnerable to stored XSS. It is not possible to inject javascript code in the
file name when creating/uploading the file. But, once created/uploaded, it can
be renamed to inject the payload in it. Additionally, the measures to prevent
renaming the file to disallowed filename extensions could be circumvented. This
is fixed in Bolt 3.7.1.
Link: https://nvd.nist.gov/vuln/detail/CVE-2020-4041
Severity: MEDIUM
CVE-2021-27367
Desc: Controller/Backend/FileEditController.php and
Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow
Directory Traversal.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-27367
Severity: HIGH
--
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
----------- следущая часть -----------
Вложение в формате HTML было извлечено…
URL: <http://lists.rosalinux.ru/pipermail/bugs/attachments/20230823/c87647bb/attachment.html>
Подробная информация о списке рассылки Bugs