Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-72hg-5wr5-rmfc: Statamic CMS remote code execution via front-end form uploads

Impact

On front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded regardless of mime validation rules. This only affects forms using the “Forms” feature and not just any arbitrary form. This does not affect the control panel.

Patches

It has been patched in 3.4.13 and 4.33.0.

ghsa
#vulnerability#web#git#php#rce

Skip to content

Sign up

CVE-2023-47129

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

Explore

*   All features
*   Documentation
*   GitHub Skills
*   Blog
  • For

    • Enterprise
    • Teams
    • Startups
    • Education

    By Solution

    • CI/CD & Automation
    • DevOps
    • DevSecOps

    Resources

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

Repositories

*   Topics
*   Trending
*   Collections
  • Pricing

Search code, repositories, users, issues, pull requests…

Provide feedback

We read every piece of feedback, and take your input very seriously.

Include my email address so I can be contacted

Saved searches****Use saved searches to filter your results more quickly

Sign in

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-47129

Statamic CMS remote code execution via front-end form uploads

High severity GitHub Reviewed Published Nov 10, 2023 in statamic/cms

Vulnerability details Dependabot alerts 0

Package

composer statamic/cms (Composer)

Affected versions

>= 4.0.0, < 4.33.0

< 3.4.13

Patched versions

4.33.0

3.4.13

Description

Impact

On front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded regardless of mime validation rules. This only affects forms using the “Forms” feature and not just any arbitrary form. This does not affect the control panel.

Patches

It has been patched in 3.4.13 and 4.33.0.

References

  • GHSA-72hg-5wr5-rmfc
  • https://nvd.nist.gov/vuln/detail/CVE-2023-47129
  • statamic/cms@098ef80
  • statamic/cms@f6c6881

jasonvarga published to statamic/cms

Nov 10, 2023

Published by the National Vulnerability Database

Nov 10, 2023

Published to the GitHub Advisory Database

Nov 12, 2023

Reviewed

Nov 12, 2023

Severity

High

8.3

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

High

Privileges required

None

User interaction

Required

Scope

Changed

Confidentiality

High

Integrity

High

Availability

High

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Weaknesses

CWE-434

CVE ID

CVE-2023-47129

GHSA ID

GHSA-72hg-5wr5-rmfc

Source code

statamic/cms

Credits

  • Cyber-Wo0dy Reporter

Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

CVE-2023-47129: Remote code execution via front-end form uploads

Statmic is a core Laravel content management system Composer package. Prior to versions 3.4.13 and 4.33.0, on front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded. This only affects forms using the "Forms" feature and not just _any_ arbitrary form. This does not affect the control panel. This issue has been patched in 3.4.13 and 4.33.0.

ghsa: Latest News

GHSA-hqmp-g7ph-x543: TunnelVision - decloaking VPNs using DHCP