Headline
GHSA-gfhp-jgp6-838j: Orckestra C1 CMS's deserialization of untrusted data allows for arbitrary code execution.
Impact
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS. Authentication is required to exploit this vulnerability. The authenticated user may perform the actions unknowingly by visiting a specially crafted site.
Patches
Patched in C1 CMS v6.13
Workarounds
Upgrade to C1 CMS v6.13 or newer is required
Credit
This issue was discovered and reported by Markus Wulftange / Code White Research.
Orckestra C1 CMS’s deserialization of untrusted data allows for arbitrary code execution.
Critical severity GitHub Reviewed Published Sep 30, 2022 in Orckestra/C1-CMS-Foundation • Updated Sep 30, 2022
Related news
Orckestra C1 CMS is a .NET based Web Content Management System. A vulnerability in versions prior to 6.13 allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS. Authentication is required to exploit this vulnerability. The authenticated user may perform the actions unknowingly by visiting a specially crafted site. This issue is patched in C1 CMS v6.13. There are no known workarounds.