Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-37473
HistoryJul 14, 2023 - 8:00 p.m.

CVE-2023-37473 Limited code execution in zenstruck/collections

2023-07-1420:00:16
CWE-74
GitHub_M
www.cve.org
cve-2023-37473
code execution
zenstruck/collections
user input
entityrepository::find()
query()
upgrade

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.9%

zenstruck/collections is a set of helpers for iterating/paginating/filtering collections. Passing callable strings (ie system) caused the function to be executed. This would result in a limited subset of specific user input being executed as if it were code. This issue has been addressed in commit f4b1c48820 and included in release version 0.2.1. Users are advised to upgrade. Users unable to upgrade should ensure that user input is not passed to either EntityRepository::find() or query().

CNA Affected

[
  {
    "vendor": "zenstruck",
    "product": "collection",
    "versions": [
      {
        "version": "< 0.2.1",
        "status": "affected"
      }
    ]
  }
]

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.9%

Related for CVELIST:CVE-2023-37473