Headline
CVE-2022-24789: Release C1 CMS 6.12 · Orckestra/C1-CMS-Foundation
C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary files to zero size (effectively delete them) leading to denial of service (DoS) or altering application logic. The authenticated user may unknowingly perform the actions by visiting a specially crafted site. Patched in C1 CMS v6.12, no known workarounds exist.
C1 CMS 6.12 (6.12.8122.18346)
Download
Download C1 CMS 6.12
What’s new in C1 CMS 6.12?
This release includes a critical security fix, and a few minor bug fixes.
Critical security fix
See the security advisory for details. This vulnerability cannot be exploited by anonymous users, but we urge all of our users to upgrade to this release at the earliest convenient time.
This issue was discovered and reported by GHSL team member @JarLob (Jaroslav Lobačevski).
Free automated upgrade
To best protect you, Orckestra is providing free, immediate, and direct access to our automated upgrade feature – any C1 installation from C1 version 5.0 and later can now be upgraded to this release, free of charge.
Minor changes and bug fixes
#798 Fixing DataFolderElementsTreeNode throwing an exception when the referenced page has multiple versions
SearchAPI: SearchResult is extended to include score and score explanation.
Search indexing: multiple registrations of IDataFieldProcessorProvider weren’t supported properly