Vulnerability Description
ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload (enabled by default). This can be used by an attacker to perform actions for an admin (or any user with the file upload capability). With this vulnerability, one can automatically upload files (by default, it allows html, pdf, xml, zip, and many other file types). A file can be accessed publicly under the "/assets/files" directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Clippercms | Clippercms | 1.3.3 |
Related Weaknesses (CWE)
References
- https://github.com/ClipperCMS/ClipperCMS/issues/494ExploitIssue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/45839/ExploitThird Party AdvisoryVDB Entry
- https://github.com/ClipperCMS/ClipperCMS/issues/494ExploitIssue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/45839/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-19135?
CVE-2018-19135 is a vulnerability with a CVSS score of 8.8 (HIGH). ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload (enabled by default). This can be used by an attacker to perform actions for an admin (or any user with the file upload capab...
How severe is CVE-2018-19135?
CVE-2018-19135 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19135?
Check the references section above for vendor advisories and patch information. Affected products include: Clippercms Clippercms.