Description
Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4303 | Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field. |
Github GHSA |
GHSA-j7fx-v37j-v3w7 | Craft CMS Vulnerable to Server-Side Template Injection |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:05:17.007Z
Reserved: 2018-12-25T00:00:00.000Z
Link: CVE-2018-20465
No data.
Status : Modified
Published: 2018-12-25T23:29:00.340
Modified: 2024-11-21T04:01:32.593
Link: CVE-2018-20465
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA