Lucene search

K
githubGitHub Advisory DatabaseGHSA-4W8R-3XRW-V25G
HistorySep 13, 2023 - 3:44 p.m.

Craft CMS Remote Code Execution vulnerability

2023-09-1315:44:09
CWE-94
GitHub Advisory Database
github.com
242
craft cms
remote code execution
update
security keys
password reset

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

0.873 High

EPSS

Percentile

98.6%

Impact

This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue.

Mitigations

  • This has been fixed in Craft 4.4.15. You should ensure you’re running at least that version.
  • Refresh your security key in case it has already been captured. You can do that by running the php craft setup/security-key command and copying the updated CRAFT_SECURITY_KEY environment variable to all production environments.
  • If you have any other private keys stored as environment variables (e.g., S3 or Stripe), refresh those as well.
  • Out of an abundance of caution, you may want to force all your users to reset their passwords in case your database was compromised. You can do that by running php craft resave/users --set passwordResetRequired --to "fn() => true".

References

https://github.com/craftcms/cms/commit/c0a37e15cc925c473e60e27fe64054993b867ac1#diff-47dd43d86f85161944dfcce2e41d31955c4184672d9bd9d82b948c6b01b86476

https://github.com/craftcms/cms/commit/7359d18d46389ffac86c2af1e0cd59e37c298857

https://github.com/craftcms/cms/commit/a270b928f3d34ad3bd953b81c304424edd57355e

https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#4415---2023-07-03-critical

Affected configurations

Vulners
Node
craftcmscraft_cmsRange≀4.4.14
CPENameOperatorVersion
craftcms/cmsle4.4.14

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

0.873 High

EPSS

Percentile

98.6%