Lucene search

K
cveGitHub_MCVE-2024-28190
HistoryApr 09, 2024 - 2:15 p.m.

CVE-2024-28190

2024-04-0914:15:08
CWE-79
GitHub_M
web.nvd.nist.gov
33
contao cms
file upload
vulnerability
patch
version 4.13.40
version 5.3.4
tooltips
popups
back end
front end
filenames
malicious code
upload fields
forms
workaround
disable

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

15.5%

Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users.

Affected configurations

Vulners
Node
contaocontaoRange4.0.04.13.40
OR
contaocontaoRange5.0.05.3.4
VendorProductVersionCPE
contaocontao*cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "contao",
    "product": "contao",
    "versions": [
      {
        "version": ">= 4.0.0, < 4.13.40",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, < 5.3.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

15.5%