Описание
PHP file inclusion via insert tags
Impact
It is possible for untrusted users to load arbitrary PHP files via insert tags.
Installations are only affected if there are untrusted back end users.
Patches
Update to Contao 4.4.56, 4.9.18 or 4.11.7.
Workarounds
Disable the login for untrusted back end users.
References
https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags
For more information
If you have any questions or comments about this advisory, open an issue in contao/contao.
Ссылки
- https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr
- https://nvd.nist.gov/vuln/detail/CVE-2021-37626
- https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html
- https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/contao/CVE-2021-37626.yaml
- https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2021-37626.yaml
Пакеты
contao/core-bundle
>= 4.0.0, < 4.4.56
4.4.56
contao/core-bundle
>= 4.5.0, < 4.9.18
4.9.18
contao/core-bundle
>= 4.10.0, < 4.11.7
4.11.7
contao/contao
>= 4.0.0, < 4.4.56
4.4.56
contao/contao
>= 4.5.0, < 4.9.18
4.9.18
contao/contao
>= 4.10.0, < 4.11.7
4.11.7
Связанные уязвимости
Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users.
Уязвимость системы управления контентом Contao, связанная с неверным управлением генерацией кода, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации