CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
15.5%
Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages.
[
{
"vendor": "contao",
"product": "contao",
"versions": [
{
"version": ">= 4.9.0, < 4.13.40",
"status": "affected"
},
{
"version": ">= 5.0.0-RC1, < 5.3.4",
"status": "affected"
}
]
}
]
contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler
github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129
github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16
github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d
github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr