Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h58v-g3q6-q9fx

Опубликовано: 22 окт. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.2

Описание

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu

Impact

What kind of vulnerability is it? Who is impacted?

It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form. Only admin users are affected and only admin users can create tags.

Patches

Has the problem been patched? What versions should users upgrade to?

The problem is patched with Version 1.6.42.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Create a custom request listener to avoid that this kind of tags are created.

References

Are there any links users can visit to find out more?

Currently not.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

sulu/sulu

composer
Затронутые версииВерсия исправления

< 1.6.43

1.6.43

EPSS

Процентиль: 52%
0.00286
Низкий

6.2 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.2
nvd
больше 4 лет назад

Sulu is an open-source PHP content management system based on the Symfony framework. In versions before 1.6.43 are subject to stored cross site scripting attacks. HTML input into Tag names is not properly sanitized. Only admin users are allowed to create tags. Users are advised to upgrade.

EPSS

Процентиль: 52%
0.00286
Низкий

6.2 Medium

CVSS3

Дефекты

CWE-79