Lucene search

K
githubGitHub Advisory DatabaseGHSA-747V-52C4-8VJ8
HistoryApr 09, 2024 - 6:52 p.m.

Contao: Unencoded insert tags in the frontend

2024-04-0918:52:51
CWE-74
GitHub Advisory Database
github.com
3
contao
insert tags
form generator
security advisory
website data.

3.1 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Impact

It is possible to inject insert tags via the form generator if the submitted form data is output on the page in a specific way.

Patches

Update to Contao 4.13.40 or 5.3.4.

Workarounds

Do not output the submitted form data on the website.

References

https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator

For more information

If you have any questions or comments about this advisory, open an issue in contao/contao.

Affected configurations

Vulners
Node
contaocontaoRange<5.3.4
OR
contaocontaoRange<4.13.40

3.1 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Related for GHSA-747V-52C4-8VJ8