Lucene search

K
githubGitHub Advisory DatabaseGHSA-CHX7-9X8H-R5MG
HistoryJul 17, 2024 - 2:27 p.m.

Silverstripe Framework has a Cross-site Scripting vulnerability with encoded payload

2024-07-1714:27:37
CWE-79
GitHub Advisory Database
github.com
4
silverstripe
framework
cross-site scripting
vulnerability
encoded payload
cms
javascript
sanitisation
security release

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

16.0%

Impact

A bad actor with access to edit content in the CMS could send a specifically crafted encoded payload to the server, which could be used to inject a JavaScript payload on the front end of the site. The payload would be sanitised on the client-side, but server-side sanitisation doesn’t catch it.

The server-side sanitisation logic has been updated to sanitise against this type of attack.

References

Affected configurations

Vulners
Node
silverstripeframeworkRange<5.2.16
VendorProductVersionCPE
silverstripeframework*cpe:2.3:a:silverstripe:framework:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

16.0%