Lucene search

K
friendsofphpOpenJS FoundationFRIENDSOFPHP:UTIC:CORE:CVE-2021-27908
HistoryJan 01, 1970 - 12:00 a.m.

Secret data exfiltration via symfony parameters

1970-01-0100:00:00
OpenJS Foundation
github.com
7

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

20.7%

Description Impact Symfony parameters (which is what Mautic transforms configuration parameters into) can be used within other Symfony parameters by design. However, this also means that an admin who is normally not privy to certain parameters, such as database credentials, could expose them by leveraging any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application. For example, Go to Configuration page -> Landing Page Settings -> Analytics script and enter this: Visit any landing page and open the JS dev console. You will see the following message with real instance db password: db password is: Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L Patches Upgrade to 3.3.2 Workarounds No References No For more information If you have any questions or comments about this advisory: Email us at [email protected]

Affected configurations

Vulners
Node
mauticcoreRange<3.3.2
VendorProductVersionCPE
mauticcore*cpe:2.3:a:mautic:core:*:*:*:*:*:*:*:*

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

20.7%

Related for FRIENDSOFPHP:UTIC:CORE:CVE-2021-27908