Make a Lasting Impression

Join the Mailing List

Who's Online

27 user(s) are online (1 user(s) are browsing News and Articles)

Members: 0
Guests: 27

more...
ImpressCMS proudly uses SourceForge
ImpressCMS on Ohloh.net
News and Articles > ImpressCMS Community News > ImpressCMS Security Announcements > Security Notification CVE-2014-4036 (Low Impact)

Security Notification CVE-2014-4036 (Low Impact)

Published by Fiammybe on 2014/6/16 (673 reads)
Security Notification CVE-2014-4036 (Low Impact)

Recently, a new security notification had been submitted to CVE without the project being notified beforehand. This has been rectified, and we are preparing the appropriate files for release.

Low Risk Vulnerability

The vulnerability in itself is low risk, as it requires the attacker to have an ImpressCMS account that has been granted access to the list page of the image manager. That can be done for each category separately in Control Panel > Media > Image Manager. You should also be sure to check general access to the Image Manager for each group.

Contrary to some reports (such as the one on NVD), it cannot be exploited without authentication. 

Temporary Patch Available

Webmasters that want to patch the vulnerability before we can release the patched versions can already use the appropriate file for their version of ImpressCMS and overwrite it on their system by unzipping in the ImpressCMS Root folder:

New versions upcoming

New versions that integrate the fix, once it is validated, will be posted on the website as soon as possible, along with a notification campaign that urges everyone to upgrade to the latest version. To be on the safe side, we have requested confirmation about the fix from another security researcher that we've worked with in the past.

Focus remains on Security

Security is one of our big concerns when developing and maintaining ImpressCMS. It is also one of the reasons our partners and customers choose to work with the project. Each time a security issue is found, we learn something for the future.

This incident has prompted us to be more proactive in looking for vulnerability reports on social media.


Navigate through the articles
Incorrect notification about XSS in content module Next article
The comments are owned by the poster. We aren't responsible for their content.
Poster Thread