Lucene search

K
githubGitHub Advisory DatabaseGHSA-VX6J-PJRH-VGJH
HistoryDec 15, 2021 - 10:54 p.m.

PHP file inclusion in the Sulu admin panel

2021-12-1522:54:20
CWE-22
GitHub Advisory Database
github.com
23
file inclusion
sulu admin
vulnerability
patch
versions
workaround
server security

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

69.4%

Impact

What kind of vulnerability is it? Who is impacted?

An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.

  • Compromised components: Arbitrary file read on the server, (Potential) Remote code execution
  • Exploitation pre-requisite: User account on the backend

Patches

Has the problem been patched? What versions should users upgrade to?

The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Overwrite the service sulu_route.generator.expression_token_provider and wrap the translator before passing it to the expression language.

References

Are there any links users can visit to find out more?

Currently not.

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
sulusuluMatch2.4.0-rc1
OR
sulusuluRange2.3.02.3.8
OR
sulusuluRange2.0.02.2.18
OR
sulusuluRange<1.6.44
VendorProductVersionCPE
sulusulu2.4.0-rc1cpe:2.3:a:sulu:sulu:2.4.0-rc1:*:*:*:*:*:*:*
sulusulu*cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

69.4%

Related for GHSA-VX6J-PJRH-VGJH