Published:2011/09/30  Last Updated:2011/09/30

BaserCMS vulnerable to access restriction


BaserCMS contains a vulnerability in access restriction.

Products Affected

  • BaserCMS and earlier


BaserCMS is an open-source Contents Management System (CMS). BaserCMS contains a vulnerability in access restriction where adding a user in the user group "operators" which is created by default when BaserCMS is installed.


Users without administrative privileges may obtain administrative privileges or alter the information of administrators.


Update the software
Update to the latest version according to the information provided by the developer.

Apply a patch
Apply the appropriate patch according to the information provided by the developer.

Apply a workaround
The following workaround may mitigate the affects of this vulnerability.

  • Do not use the default user group "operators"


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2011.09.30

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication login caused to be created by an administrator
  • Low-Mid
User Interaction Required the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspiciouse
  • High

Description of each analysis measures


Masako Ohno reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2011-2674
JVN iPedia JVNDB-2011-000066