Skip to content

Commit e97efb3

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@2e1e799
1 parent 6a4e2a8 commit e97efb3

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-2304 (camaleon_cms): Camaleon CMS Vulnerable to Privilege Escalation
4+
through a Mass Assignment'
5+
comments: false
6+
categories:
7+
- camaleon_cms
8+
advisory:
9+
gem: camaleon_cms
10+
cve: 2025-2304
11+
ghsa: rp28-mvq3-wf8j
12+
url: https://github.com/advisories/GHSA-rp28-mvq3-wf8j
13+
title: Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment
14+
date: 2025-03-14
15+
description: |
16+
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS
17+
18+
When a user wishes to change his password, the 'updated_ajax' method
19+
of the UsersController is called. The vulnerability stems from the
20+
use of the dangerous permit! method, which allows all parameters to
21+
pass through without any filtering.
22+
cvss_v4: 9.4
23+
patched_versions:
24+
- ">= 2.9.1"
25+
related:
26+
url:
27+
- https://nvd.nist.gov/vuln/detail/CVE-2025-2304
28+
- https://www.tenable.com/security/research/tra-2025-09
29+
- https://github.com/owen2345/camaleon-cms/pull/1109
30+
- https://github.com/owen2345/camaleon-cms/commit/179fd6b1ecf258d3e214aebfa87ac4a322ea4db4
31+
- https://github.com/owen2345/camaleon-cms/releases/tag/2.9.1
32+
- https://github.com/advisories/GHSA-rp28-mvq3-wf8j
33+
---

0 commit comments

Comments
 (0)