| CVE-2021-28977 |
BDSA-2021-1890 |
Low |
Jun 23, 2021 |
Cross Site Scripting vulnerability in GetSimpleCMS 3.3.16 in admin/upload.php by adding comments or jpg and other file header information to the conten
more...
Cross Site Scripting vulnerability in GetSimpleCMS 3.3.16 in admin/upload.php by adding comments or jpg and other file header information to the content of xla, pages, and gzip files,
less...
|
3.3.15, 3.3.12, 3.1.2, 3.1.1, 3.1, 1.1, 2.01, 1.0, 1.5, 1.71
|
| CVE-2020-18660 |
BDSA-2019-5198 |
Medium |
Jun 23, 2021 |
GetSimpleCMS <=3.3.15 has an open redirect in admin/changedata.php via the redirect function to the url parameter.
GetSimpleCMS <=3.3.15 has an open redirect in admin/changedata.php via the redirect function to the url parameter.
less...
|
3.3.15, 3.3.12, 3.1.2, 3.1.1, 3.1, 1.1, 2.01, 1.0, 1.5, 1.71
|
| CVE-2020-18659 |
BDSA-2019-5201 |
Medium |
Jun 23, 2021 |
Cross Site Scripting vulnerability in GetSimpleCMS <=3.3.15 via the (1) sitename, (2) username, and (3) email parameters to /admin/setup.php
Cross Site Scripting vulnerability in GetSimpleCMS <=3.3.15 via the (1) sitename, (2) username, and (3) email parameters to /admin/setup.php
less...
|
3.3.15, 3.3.12, 3.1.2, 3.1.1, 3.1, 1.1, 2.01, 1.0, 1.5, 1.71
|
| CVE-2020-18658 |
BDSA-2019-5199 |
Medium |
Jun 23, 2021 |
Cross Site Scriptiong (XSS) vulnerability in GetSimpleCMS <=3.3.15 via the timezone parameter to settings.php.
Cross Site Scriptiong (XSS) vulnerability in GetSimpleCMS <=3.3.15 via the timezone parameter to settings.php.
less...
|
3.3.15, 3.3.12, 3.1.2, 3.1.1, 3.1, 1.1, 2.01, 1.0, 1.5, 1.71
|
| CVE-2020-18657 |
BDSA-2019-5200 |
Medium |
Jun 23, 2021 |
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function
more...
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.
less...
|
3.3.15, 3.3.12, 3.1.2, 3.1.1, 3.1, 1.1, 2.01, 1.0, 1.5, 1.71
|
| CVE-2020-18191 |
BDSA-2019-4766 |
Medium |
Oct 02, 2020 |
GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php
GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php
less...
|
3.3.15
|
| CVE-2019-16333 |
BDSA-2019-4730 |
Low |
Sep 15, 2019 |
GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.
GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.
less...
|
3.3.15
|
| CVE-2019-11231 |
BDSA-2019-1568 |
Medium |
May 22, 2019 |
An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary
more...
An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary content (PHP code, for example). This vulnerability is triggered by an authenticated user; however, authentication can be bypassed. According to the official documentation for installation step 10, an admin is required to upload all the files, including the .htaccess files, and run a health check. However, what is overlooked is that the Apache HTTP Server by default no longer enables the AllowOverride directive, leading to data/users/admin.xml password exposure. The passwords are hashed but this can be bypassed by starting with the data/other/authorization.xml API key. This allows one to target the session state, since they decided to roll their own implementation. The cookie_name is crafted information that can be leaked from the frontend (site name and version). If a someone leaks the API key and the admin username, then they can bypass authentication. To do so, they need to supply a cookie based on an SHA-1 computation of this known information. The vulnerability exists in the admin/theme-edit.php file. This file checks for forms submissions via POST requests, and for the csrf nonce. If the nonce sent is correct, then the file provided by the user is uploaded. There is a path traversal allowing write access outside the jailed themes directory root. Exploiting the traversal is not necessary because the .htaccess file is ignored. A contributing factor is that there isn't another check on the extension before saving the file, with the assumption that the parameter content is safe. This allows the creation of web accessible and executable files with arbitrary content.
less...
|
3.3.15, 3.3.12, 3.1.2, 3.1.1, 3.1, 1.1, 2.01, 1.0, 1.5, 1.71
|
| CVE-2018-19421 |
BDSA-2018-4200 |
Medium |
Nov 21, 2018 |
In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but Internet Explorer render HTML elements in a .eml file, because of admin/upload-upload
more...
In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but Internet Explorer render HTML elements in a .eml file, because of admin/upload-uploadify.php, and validate_safe_file in admin/inc/security_functions.php.
less...
|
3.3.15
|
| CVE-2018-19420 |
BDSA-2018-4201 |
Medium |
Nov 21, 2018 |
In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but there are several alternative cases in which HTML can be executed, such as a file wit
more...
In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but there are several alternative cases in which HTML can be executed, such as a file with no extension or an unrecognized extension (e.g., the test or test.asdf filename), because of admin/upload-uploadify.php, and validate_safe_file in admin/inc/security_functions.php.
less...
|
3.3.15
|