Lucene search

K
githubGitHub Advisory DatabaseGHSA-4HJQ-422Q-4VPX
HistoryApr 06, 2021 - 5:20 p.m.

Mautic vulnerable to secret data exfiltration via symfony parameters

2021-04-0617:20:58
CWE-74
CWE-732
GitHub Advisory Database
github.com
38
mautic
data exfiltration
symfony
parameters
admin
configuration
credentials
vulnerability
patch
upgrade

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

EPSS

0.001

Percentile

20.7%

Impact

Symfony parameters (which is what Mautic transforms configuration parameters into) can be used within other Symfony parameters by design. However, this also means that an admin who is normally not privy to certain parameters, such as database credentials, could expose them by leveraging any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application.

For example,

  1. Go to Configuration page -> Landing Page Settings -> Analytics script and enter this: <script&gt; console.log("db password is: %mautic.db_password%"); &lt;/script&gt;
  2. Visit any landing page and open the JS dev console. You will see the following message with real instance db password: db password is: &lt;real password&gt;

Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

Patches

Upgrade to 3.3.2

Workarounds

No

References

No

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
mauticcoreRange<3.3.2
VendorProductVersionCPE
mauticcore*cpe:2.3:a:mautic:core:*:*:*:*:*:*:*:*

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

EPSS

0.001

Percentile

20.7%