Описание
XSS injection in the Grid component of Sylius
Grid component of Sylius omits HTML input sanitisation while rendering object implementing __toString() method through the string field type.
Пакеты
sylius/grid
>= 1.0.0, < 1.1.19
1.1.19
sylius/grid
>= 1.2.0, < 1.2.18
1.2.18
sylius/grid
>= 1.3.0, < 1.3.13
1.3.13
sylius/grid
>= 1.4.0, < 1.4.5
1.4.5
sylius/grid
>= 1.5.0, < 1.5.1
1.5.1
sylius/grid-bundle
>= 1.0.0, < 1.1.19
1.1.19
sylius/grid-bundle
>= 1.2.0, < 1.2.18
1.2.18
sylius/grid-bundle
>= 1.3.0, < 1.3.13
1.3.13
sylius/grid-bundle
>= 1.4.0, < 1.4.5
1.4.5
sylius/grid-bundle
>= 1.5.0, < 1.5.1
1.5.1
sylius/sylius
>= 1.0.0, < 1.1.18
1.1.18
sylius/sylius
>= 1.2.0, < 1.2.17
1.2.17
sylius/sylius
>= 1.3.0, < 1.3.12
1.3.12
sylius/sylius
>= 1.4.0, < 1.4.4
1.4.4
Связанные уязвимости
An issue was discovered in Sylius products. Missing input sanitization in sylius/sylius 1.0.x through 1.0.18, 1.1.x through 1.1.17, 1.2.x through 1.2.16, 1.3.x through 1.3.11, and 1.4.x through 1.4.3 and sylius/grid 1.0.x through 1.0.18, 1.1.x through 1.1.18, 1.2.x through 1.2.17, 1.3.x through 1.3.12, 1.4.x through 1.4.4, and 1.5.0 allows an attacker (an admin in the sylius/sylius case) to perform XSS by injecting malicious code into a field displayed in a grid with the "string" field type. The contents are an object, with malicious code returned by the __toString() method of that object.