Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment
Critical severity
GitHub Reviewed
Published
Mar 14, 2025
to the GitHub Advisory Database
•
Updated Mar 19, 2025
Description
Published by the National Vulnerability Database
Mar 14, 2025
Published to the GitHub Advisory Database
Mar 14, 2025
Reviewed
Mar 17, 2025
Last updated
Mar 19, 2025
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS
When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
References