File tree Expand file tree Collapse file tree 1 file changed +25
-0
lines changed Expand file tree Collapse file tree 1 file changed +25
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : camaleon_cms
3+ cve : 2025-2304
4+ ghsa : rp28-mvq3-wf8j
5+ url : https://github.com/advisories/GHSA-rp28-mvq3-wf8j
6+ title : Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment
7+ date : 2025-03-14
8+ description : |
9+ A Privilege Escalation through a Mass Assignment exists in Camaleon CMS
10+
11+ When a user wishes to change his password, the 'updated_ajax' method
12+ of the UsersController is called. The vulnerability stems from the
13+ use of the dangerous permit! method, which allows all parameters to
14+ pass through without any filtering.
15+ cvss_v4 : 9.4
16+ patched_versions :
17+ - " >= 2.9.1"
18+ related :
19+ url :
20+ - https://nvd.nist.gov/vuln/detail/CVE-2025-2304
21+ - https://www.tenable.com/security/research/tra-2025-09
22+ - https://github.com/owen2345/camaleon-cms/pull/1109
23+ - https://github.com/owen2345/camaleon-cms/commit/179fd6b1ecf258d3e214aebfa87ac4a322ea4db4
24+ - https://github.com/owen2345/camaleon-cms/releases/tag/2.9.1
25+ - https://github.com/advisories/GHSA-rp28-mvq3-wf8j
You can’t perform that action at this time.
0 commit comments