Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2xpq-xp6c-5mgj

Опубликовано: 17 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

Contao affected by insert tag injection via canonical URL

Impact

It is possible to inject insert tags in canonical URLs which will be replaced when the page is rendered.

Patches

Update to Contao 4.13.49, 5.3.15 or 5.4.3.

Workarounds

Disable canonical tags in the settings of the website root page.

References

https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls

For more information

If you have any questions or comments about this advisory, open an issue in contao/contao.

Пакеты

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 4.13.0, < 4.13.49

4.13.49

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 5.0.0, < 5.3.15

5.3.15

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 5.4.0, < 5.4.3

5.4.3

EPSS

Процентиль: 72%
0.00719
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-20
CWE-74
CWE-79

Связанные уязвимости

CVSS3: 5.3
nvd
больше 1 года назад

Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings.

EPSS

Процентиль: 72%
0.00719
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-20
CWE-74
CWE-79