Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-39wj-j3jc-858m

Опубликовано: 19 янв. 2021
Источник: github
Github: Прошло ревью

Описание

XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic

Impact

This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic.

This vulnerability was reported by Naveen Sunkavally at Horizon3.ai.

Patches

Upgrade to 3.2.4 or 2.16.5.

Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff

Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff

Workarounds

None

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

mautic/core

composer
Затронутые версииВерсия исправления

>= 3.0.0, < 3.2.4

3.2.4

Наименование

mautic/core

composer
Затронутые версииВерсия исправления

>= 2.0.0, < 2.16.5

2.16.5

EPSS

Процентиль: 78%
0.01142
Низкий

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 9.6
nvd
около 5 лет назад

A cross-site scripting (XSS) vulnerability in the assets component of Mautic before 3.2.4 allows remote attackers to inject executable JavaScript through the Referer header of asset downloads.

EPSS

Процентиль: 78%
0.01142
Низкий

Дефекты

CWE-79