Lucene search

K
githubGitHub Advisory DatabaseGHSA-73GR-32WG-QHH7
HistorySep 18, 2024 - 10:05 p.m.

Mautic vulnerable to XSS in contact/company tracking (no authentication)

2024-09-1822:05:30
CWE-79
GitHub Advisory Database
github.com
mautic
xss
security patch
input validation

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

31.3%

Summary

Prior to this patch being applied, Mautic’s tracking was vulnerable to Cross-Site Scripting through the Page URL variable.

Patches

Please update to 4.4.13 or 5.1.1 or later.

Workarounds

None

References

https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)
https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/02-Testing_for_Stored_Cross_Site_Scripting

If you have any questions or comments about this advisory:
Email us at [email protected]

Affected configurations

Vulners
Node
mauticcore-libRange5.0.0-alpha5.1.1
OR
mauticcore-libRange2.6.04.4.13
OR
mauticcoreRange5.0.0-alpha5.1.1
OR
mauticcoreRange2.6.04.4.13
VendorProductVersionCPE
mauticcore-lib*cpe:2.3:a:mautic:core-lib:*:*:*:*:*:*:*:*
mauticcore*cpe:2.3:a:mautic:core:*:*:*:*:*:*:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

31.3%

Related for GHSA-73GR-32WG-QHH7