Lucene search

K
githubGitHub Advisory DatabaseGHSA-WXXW-5GQ6-J2G5
HistoryMay 15, 2024 - 6:31 p.m.

contao/core Insufficient input validation allows for code injection and remote execution

2024-05-1518:31:02
GitHub Advisory Database
github.com
2
contao
core
input validation
code injection
remote execution
vulnerability
software

7.9 High

AI Score

Confidence

High

contao/core versions 2.x prior to 2.11.17 and 3.x prior to 3.2.9 are vulnerable to arbitrary code execution on the server due to insufficient input validation. In fact, attackers can remove or change pathconfig.php by entering a URL, meaning that the entire Contao installation will no longer be accessible or malicious code can be executed.

Affected configurations

Vulners
Node
contaocontaoRange<3.2.9
OR
contaocontaoRange<2.11.17
CPENameOperatorVersion
contao/corelt3.2.9
contao/corelt2.11.17

7.9 High

AI Score

Confidence

High