We have moved to GitHub Issues
Created by Sebastiaan Janssen 06 Oct 2017, 13:14:30 Updated by Tommy Enger 17 Oct 2017, 09:46:25
The attacker can use this vulnerability to read files on the server, or another attack like SSRF to find other open port and service on the network.
Hi @sebastiaan Is it pssible to give some more information about this vulnerability? How to exploit it? Do you need to be authenticated or can you be anonymous? Would you recommend to upgrade ASAP because of this?
We've classified this as very low priority. Only if you import a document type (for which you need to be an authenticated administrator) which has been tampered with can this be exploited.
Any administrator in the system will have an easier time just updating a template with some malicious C# in the template editor. :-)
To be extra careful, the advise is: on your live server, don't give anybody access to the settings or developer section.
Backwards Compatible: True
Due in version: 7.7.3, 7.6.10
Story Points: 0.5