Lucene search

K
friendsofphpOpenJS FoundationFRIENDSOFPHP:SYLIUS:RESOURCE-BUNDLE:CVE-2020-15146
HistoryJan 01, 1970 - 12:00 a.m.

CVE-2020-15146: Remote Code Execution in OptionsParser while using request parameters inside expression language

1970-01-0100:00:00
OpenJS Foundation
github.com
7

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

AI Score

7.4

Confidence

High

EPSS

0.004

Percentile

74.5%

Description Impact Request parameters injected inside an expression evaluated by symfony/expression-language package haven’t been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. The vulnerable versions include: <=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3. Example sylius_grid: grids: foo: fields: bar: options: baz: “expr:service(‘sylius.repository.product’).find($id)” In this case, $id can be prepared in a way that calls other services. If you visit /route?id=“~service(‘doctrine’).getManager().getConnection().executeQuery(“DELETE * FROM TABLE”)~”, it will result in a following expression expr:service(‘repository’).find(“”~service(‘doctrine’).getManager().getConnection().executeQuery(“DELETE * FROM TABLE”)~“”), which will execute a query on the currently connected database. To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language. Patches This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched. Workarounds The fix requires adding addslashes in OptionsParser::parseOptionExpression to sanitize user input before evaluating it using the expression language. - return is_string($variable) ? sprintf(‘“%s”’, $variable) : $variable; + return is_string($variable) ? sprintf(‘“%s”’, addslashes($variable)) : $variable; Acknowledgements This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot! For more information If you have any questions or comments about this advisory: Email us at [email protected]

Affected configurations

Vulners
Node
syliuspaypalRange<1.6.4sylius
VendorProductVersionCPE
syliuspaypal*cpe:2.3:a:sylius:paypal:*:*:*:*:*:sylius:*:*

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

AI Score

7.4

Confidence

High

EPSS

0.004

Percentile

74.5%

Related for FRIENDSOFPHP:SYLIUS:RESOURCE-BUNDLE:CVE-2020-15146