Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-12467 CVE-2020-12468 CVE-2020-12469 |
CWE-ID | CWE-384 CWE-94 CWE-502 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #2 is available. Public exploit code for vulnerability #3 is available. |
Vulnerable software Subscribe |
Subrion CMS Web applications / CMS |
Vendor | Intelliants |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU27472
Risk: Medium
CVSSv3.1: 6.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:U/RC:C]
CVE-ID: CVE-2020-12467
CWE-ID:
CWE-384 - Session Fixation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information on the system.
The vulnerability exists due to insufficient session validation in an alphanumeric value in a session cookie. A remote attacker can hijacking the user-validated session by forcing an arbitrary session ID
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSubrion CMS: 4.2.1
External linkshttp://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Session%20Fixation
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU27473
Risk: Medium
CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C]
CVE-ID: CVE-2020-12468
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to inject arbitrary code into CSV files.
The vulnerability exists within "phrases/add/" and "languages/download/" due to insufficient sanitization of user-supplied data when constructing CSV files in the numerous fields. A remote attacker can inject malicious data into the contact form fields that is used later by the plugin to generate CSV files. Such files can be opened with Microsoft Excel built-in functions and utilize its functionality to execute malicious macros.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSubrion CMS: 4.2.1
External linkshttp://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/CSV%20Injection
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU27474
Risk: Medium
CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C]
CVE-ID: CVE-2020-12469
CWE-ID:
CWE-502 - Deserialization of Untrusted Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to delete arbitrary files.
The vulnerability exists in "admin/blocks.php" file due to insecure input validation when processing serialized data in the subpages value within a block to blocks/edit. A remote authenticated attacker can pass specially crafted data to the application, cause PHP Object Injection and delete arbitrary files on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSubrion CMS: 4.2.1
External linksQ & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.