From 8a231f38a90e4fd8d44e165e8ac68590cb6e98f6 Mon Sep 17 00:00:00 2001 From: Al Snow Date: Tue, 18 Mar 2025 09:38:16 -0400 Subject: [PATCH] GHSA SYNC: 1 brand new advisory --- gems/camaleon_cms/CVE-2025-2304.yml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 gems/camaleon_cms/CVE-2025-2304.yml diff --git a/gems/camaleon_cms/CVE-2025-2304.yml b/gems/camaleon_cms/CVE-2025-2304.yml new file mode 100644 index 0000000000..afc2c88931 --- /dev/null +++ b/gems/camaleon_cms/CVE-2025-2304.yml @@ -0,0 +1,25 @@ +--- +gem: camaleon_cms +cve: 2025-2304 +ghsa: rp28-mvq3-wf8j +url: https://github.com/advisories/GHSA-rp28-mvq3-wf8j +title: Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment +date: 2025-03-14 +description: | + A Privilege Escalation through a Mass Assignment exists in Camaleon CMS + + When a user wishes to change his password, the 'updated_ajax' method + of the UsersController is called. The vulnerability stems from the + use of the dangerous permit! method, which allows all parameters to + pass through without any filtering. +cvss_v4: 9.4 +patched_versions: + - ">= 2.9.1" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2025-2304 + - https://www.tenable.com/security/research/tra-2025-09 + - https://github.com/owen2345/camaleon-cms/pull/1109 + - https://github.com/owen2345/camaleon-cms/commit/179fd6b1ecf258d3e214aebfa87ac4a322ea4db4 + - https://github.com/owen2345/camaleon-cms/releases/tag/2.9.1 + - https://github.com/advisories/GHSA-rp28-mvq3-wf8j