File tree Expand file tree Collapse file tree 1 file changed +33
-0
lines changed Expand file tree Collapse file tree 1 file changed +33
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2025-2304 (camaleon_cms): Camaleon CMS Vulnerable to Privilege Escalation
4+ through a Mass Assignment'
5+ comments : false
6+ categories :
7+ - camaleon_cms
8+ advisory :
9+ gem : camaleon_cms
10+ cve : 2025-2304
11+ ghsa : rp28-mvq3-wf8j
12+ url : https://github.com/advisories/GHSA-rp28-mvq3-wf8j
13+ title : Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment
14+ date : 2025-03-14
15+ description : |
16+ A Privilege Escalation through a Mass Assignment exists in Camaleon CMS
17+
18+ When a user wishes to change his password, the 'updated_ajax' method
19+ of the UsersController is called. The vulnerability stems from the
20+ use of the dangerous permit! method, which allows all parameters to
21+ pass through without any filtering.
22+ cvss_v4 : 9.4
23+ patched_versions :
24+ - " >= 2.9.1"
25+ related :
26+ url :
27+ - https://nvd.nist.gov/vuln/detail/CVE-2025-2304
28+ - https://www.tenable.com/security/research/tra-2025-09
29+ - https://github.com/owen2345/camaleon-cms/pull/1109
30+ - https://github.com/owen2345/camaleon-cms/commit/179fd6b1ecf258d3e214aebfa87ac4a322ea4db4
31+ - https://github.com/owen2345/camaleon-cms/releases/tag/2.9.1
32+ - https://github.com/advisories/GHSA-rp28-mvq3-wf8j
33+ ---
You can’t perform that action at this time.
0 commit comments