CVE-2023-37649
PHP vulnerability analysis and mitigation

Overview

Incorrect access control in the component /models/Content of Cockpit CMS v2.5.2 allows unauthorized attackers to access sensitive data. The vulnerability was discovered on July 10, 2023, and affects Cockpit CMS versions up to and including 2.5.2 (CVE Details, GhostCcamm Blog).

Technical details

The vulnerability exists in the populate function within the Content API, where relational mappings are processed without proper access control validation. When data contains id and model attributes, Cockpit CMS resolves the mapping and fetches corresponding data without validating if the querying user is authorized to access that data. The issue is compounded by the fact that the CMS does not validate the types of inputs within JSON requests, allowing manipulation of field types (GhostCcamm Blog). The vulnerability has been assigned a CVSS v3.1 base score of 7.5 HIGH with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (CVE Details).

Impact

This vulnerability allows unauthorized attackers to access sensitive data stored in the CMS by exploiting the relational mapping functionality. Attackers can potentially access any content in the system, regardless of their permission level, leading to unauthorized disclosure of confidential information (GhostCcamm Blog).

Mitigation and workarounds

The vulnerability has been patched in Cockpit CMS version 2.6.0. The fix includes additional validation in the populate function to verify user permissions before allowing access to related content. Users are strongly advised to upgrade to version 2.6.0 or later (Release Notes).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management