Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-45592
HistorySep 10, 2024 - 4:00 p.m.

CVE-2024-45592 auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped

2024-09-1016:00:14
CWE-79
GitHub_M
github.com
1
auditor-bundle
cross-site scripting
entity property
symfony
javascript injection
vulnerability
fixed

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

21.3%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to version 5.2.6, there is an unescaped entity property enabling Javascript injection. This is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in versions 6.0.0 and 5.2.6.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:damienharper:auditor-bundle:*:*:*:*:*:*:*:*"
    ],
    "vendor": "damienharper",
    "product": "auditor-bundle",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "5.2.6",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

21.3%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-45592