Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4gpr-p634-922x

Опубликовано: 25 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.6

Описание

Cross site scripting via input unit widget

Impact

Authenticated users can inject malicious code in widgets with units, which is then executed both in the element preview (back end) and on the website (front end).

Patches

Update to Contao 4.9.42, 4.13.28 or 5.1.10.

Workarounds

Disable login for all untrusted back end users.

References

https://contao.org/en/security-advisories/cross-site-scripting-in-widgets-with-units

For more information

If you have any questions or comments about this advisory, open an issue in contao/contao.

Credits

Thanks to Christian Pöschl and Fabian Brenner from usd AG for reporting this vulnerability.

Пакеты

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 4.0.0, < 4.9.42

4.9.42

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 4.10.0, < 4.13.28

4.13.28

Наименование

contao/core-bundle

composer
Затронутые версииВерсия исправления

>= 5.0.0, < 5.1.10

5.1.10

EPSS

Процентиль: 41%
0.00192
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.5
nvd
больше 2 лет назад

Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users.

EPSS

Процентиль: 41%
0.00192
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-79