Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-px8v-hxxx-2rgh

Опубликовано: 08 мая 2020
Источник: github
Github: Прошло ревью
CVSS3: 7.4

Описание

Potential Code Injection in Sprout Forms

Impact

A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code.

Patches

The problem is fixed inbarrelstrength/sprout-forms:v3.9.0 which upgrades to barrelstrength/sprout-base-email:v1.2.7

Workarounds

Users unable to upgrade should update any Notification Emails to use the "Basic Notification (Sprout Email)" template and avoid using the "Basic Notification (Sprout Forms)" template or any custom templates that display Form Fields.

References

  • See the release notes in the CHANGELOG
  • Credits to Paweł Hałdrzyński, Daniel Kalinowski from ISEC.PL for discovery and responsible disclosure

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

barrelstrength/sprout-base-email

composer
Затронутые версииВерсия исправления

< 1.2.7

1.2.7

Наименование

barrelstrength/sprout-forms

composer
Затронутые версииВерсия исправления

< 3.9.0

3.9.0

EPSS

Процентиль: 68%
0.00557
Низкий

7.4 High

CVSS3

Дефекты

CWE-74
CWE-94

Связанные уязвимости

CVSS3: 7.4
nvd
почти 6 лет назад

In Sprout Forms before 3.9.0, there is a potential Server-Side Template Injection vulnerability when using custom fields in Notification Emails which could lead to the execution of Twig code. This has been fixed in 3.9.0.

EPSS

Процентиль: 68%
0.00557
Низкий

7.4 High

CVSS3

Дефекты

CWE-74
CWE-94