All the vulnerabilites related to contao - contao
cve-2022-26265
Vulnerability from cvelistv5
Published
2022-03-18 22:57
Modified
2024-08-03 04:56
Severity ?
EPSS score ?
Summary
Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.
References
▼ | URL | Tags |
---|---|---|
https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-18T22:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-26265", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md", "refsource": "MISC", "url": "https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-26265", "datePublished": "2022-03-18T22:57:01", "dateReserved": "2022-02-28T00:00:00", "dateUpdated": "2024-08-03T04:56:37.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-29790
Vulnerability from cvelistv5
Published
2025-03-18 18:36
Modified
2025-03-18 18:48
Severity ?
EPSS score ?
Summary
Contao allows cross-site scripting through SVG uploads
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-vqqr-fgmh-f626 | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-29790", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-18T18:48:29.028406Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-18T18:48:39.399Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.13.54" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.30" }, { "status": "affected", "version": "\u003e= 5.4.0, \u003c 5.5.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. Users can upload SVG files with malicious code, which is then executed in the back end and/or front end. This vulnerability is fixed in Contao 4.13.54, 5.3.30, or 5.5.6." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-18T18:36:34.279Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-vqqr-fgmh-f626", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-vqqr-fgmh-f626" }, { "name": "https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads" } ], "source": { "advisory": "GHSA-vqqr-fgmh-f626", "discovery": "UNKNOWN" }, "title": "Contao allows cross-site scripting through SVG uploads" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-29790", "datePublished": "2025-03-18T18:36:34.279Z", "dateReserved": "2025-03-11T14:23:00.476Z", "dateUpdated": "2025-03-18T18:48:39.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30262
Vulnerability from cvelistv5
Published
2024-04-09 16:45
Modified
2024-08-02 01:32
Severity ?
EPSS score ?
Summary
Contao's remember-me tokens will not be cleared after a password change
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5 | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30262", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T19:19:06.729095Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:39:15.815Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5" }, { "name": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003c 4.13.40" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable \"Allow auto login\" in the login module.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613: Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384: Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T16:45:57.132Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5" }, { "name": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9" } ], "source": { "advisory": "GHSA-r4r6-j2j3-7pp5", "discovery": "UNKNOWN" }, "title": "Contao\u0027s remember-me tokens will not be cleared after a password change" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-30262", "datePublished": "2024-04-09T16:45:57.132Z", "dateReserved": "2024-03-26T12:52:00.935Z", "dateUpdated": "2024-08-02T01:32:07.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10125
Vulnerability from cvelistv5
Published
2020-03-16 14:40
Modified
2024-08-05 07:32
Severity ?
EPSS score ?
Summary
Contao before 4.5.7 has XSS in the system log.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:32:01.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao before 4.5.7 has XSS in the system log." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-16T14:40:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao before 4.5.7 has XSS in the system log." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-10125", "datePublished": "2020-03-16T14:40:15", "dateReserved": "2018-04-16T00:00:00", "dateUpdated": "2024-08-05T07:32:01.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37627
Vulnerability from cvelistv5
Published
2021-08-11 22:50
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Privilege escalation via form generator
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003c 4.4.56" }, { "status": "affected", "version": "\u003e= 4.5.0, \u003c 4.9.18" }, { "status": "affected", "version": "\u003e= 4.10.0, \u003c 4.11.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-11T22:50:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m" }, { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html" } ], "source": { "advisory": "GHSA-hq5m-mqmx-fw6m", "discovery": "UNKNOWN" }, "title": "Privilege escalation via form generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37627", "STATE": "PUBLIC", "TITLE": "Privilege escalation via form generator" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contao", "version": { "version_data": [ { "version_value": "\u003c 4.4.56" }, { "version_value": "\u003e= 4.5.0, \u003c 4.9.18" }, { "version_value": "\u003e= 4.10.0, \u003c 4.11.7" } ] } } ] }, "vendor_name": "contao" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269: Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m", "refsource": "CONFIRM", "url": "https://github.com/contao/contao/security/advisories/GHSA-hq5m-mqmx-fw6m" }, { "name": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html", "refsource": "MISC", "url": "https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html" } ] }, "source": { "advisory": "GHSA-hq5m-mqmx-fw6m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37627", "datePublished": "2021-08-11T22:50:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-28235
Vulnerability from cvelistv5
Published
2024-04-09 15:50
Modified
2024-08-02 00:48
Severity ?
EPSS score ?
Summary
Contao possible cookie sharing with external domains while checking protected pages for broken links
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28235", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T19:31:57.807830Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:03:52.358Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr" }, { "name": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16" }, { "name": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d" }, { "name": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler" }, { "name": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.9.0, \u003c 4.13.40" }, { "status": "affected", "version": "\u003e= 5.0.0-RC1, \u003c 5.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T15:50:56.531Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr" }, { "name": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16" }, { "name": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d" }, { "name": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler" }, { "name": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129" } ], "source": { "advisory": "GHSA-9jh5-qf84-x6pr", "discovery": "UNKNOWN" }, "title": "Contao possible cookie sharing with external domains while checking protected pages for broken links" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28235", "datePublished": "2024-04-09T15:50:56.531Z", "dateReserved": "2024-03-07T14:33:30.035Z", "dateUpdated": "2024-08-02T00:48:49.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19745
Vulnerability from cvelistv5
Published
2019-12-17 14:17
Modified
2024-08-05 02:25
Severity ?
EPSS score ?
Summary
Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news.html | x_refsource_MISC | |
https://contao.org/en/security-advisories/unrestricted-file-uploads.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-17T14:17:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19745", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news.html", "refsource": "MISC", "url": "https://contao.org/en/news.html" }, { "name": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/unrestricted-file-uploads.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19745", "datePublished": "2019-12-17T14:17:35", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-08-05T02:25:12.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45398
Vulnerability from cvelistv5
Published
2024-09-17 19:56
Modified
2024-09-18 13:17
Severity ?
EPSS score ?
Summary
Remote command execution through file upload in contao/core-bundle
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5 | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:contao:contao:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "contao", "vendor": "contao", "versions": [ { "lessThanOrEqual": "4.13.49", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThanOrEqual": "5.3.15", "status": "affected", "version": "5.0.0", "versionType": "custom" }, { "lessThanOrEqual": "5.4.3", "status": "affected", "version": "5.4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45398", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:14:03.501932Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:17:36.013Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e=4.0.0, \u003c 4.13.49" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.15" }, { "status": "affected", "version": "\u003e= 5.4.0, \u003c 5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions a back end user with access to the file manager can upload malicious files and execute them on the server. Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to update are advised to configure their web server so it does not execute PHP files and other scripts in the Contao file upload directory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:56:00.791Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-vm6r-j788-hjh5" }, { "name": "https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/remote-command-execution-through-file-uploads" } ], "source": { "advisory": "GHSA-vm6r-j788-hjh5", "discovery": "UNKNOWN" }, "title": "Remote command execution through file upload in contao/core-bundle" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45398", "datePublished": "2024-09-17T19:56:00.791Z", "dateReserved": "2024-08-28T20:21:32.802Z", "dateUpdated": "2024-09-18T13:17:36.013Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11512
Vulnerability from cvelistv5
Published
2019-07-09 20:33
Modified
2024-08-04 22:55
Severity ?
EPSS score ?
Summary
Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news/security-vulnerability-cve-2019-11512.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:55:40.710Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-09T20:33:49", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.x allows SQL Injection. Fixed in Contao 4.4.39 and Contao 4.7.5." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html", "refsource": "MISC", "url": "https://contao.org/en/news/security-vulnerability-cve-2019-11512.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11512", "datePublished": "2019-07-09T20:33:49", "dateReserved": "2019-04-24T00:00:00", "dateUpdated": "2024-08-04T22:55:40.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45965
Vulnerability from cvelistv5
Published
2024-10-02 00:00
Modified
2025-03-24 19:04
Severity ?
EPSS score ?
Summary
Contao before 5.5.6 allows XSS via an SVG document. This affects (in contao/core-bundle in Composer) 4.x before 4.13.54, 5.0.x through 5.3.x before 5.3.30, and 5.4.x and 5.5..x before 5.5.6.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:contao:contao:5.4.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "5.4.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-45965", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T20:29:10.374330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T20:30:17.783Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Contao", "vendor": "Contao", "versions": [ { "lessThan": "4.13.54", "status": "affected", "version": "4.0.0", "versionType": "semver" }, { "lessThan": "5.3.30", "status": "affected", "version": "5.0.0", "versionType": "semver" }, { "lessThan": "5.5.6", "status": "affected", "version": "5.4.0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.13.54", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.3.30", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.5.6", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao before 5.5.6 allows XSS via an SVG document. This affects (in contao/core-bundle in Composer) 4.x before 4.13.54, 5.0.x through 5.3.x before 5.3.30, and 5.4.x and 5.5..x before 5.5.6." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T19:04:03.032Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://grimthereaperteam.medium.com/contao-5-4-1-malicious-file-upload-xss-in-svg-30edb8820ecb" }, { "url": "https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-45965", "datePublished": "2024-10-02T00:00:00.000Z", "dateReserved": "2024-09-11T00:00:00.000Z", "dateUpdated": "2025-03-24T19:04:03.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-28234
Vulnerability from cvelistv5
Published
2024-04-09 13:59
Modified
2024-08-02 00:48
Severity ?
EPSS score ?
Summary
Contao has insufficient BBCode sanitizer
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2 | x_refsource_MISC | |
https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2 | x_refsource_MISC | |
https://contao.org/en/security-advisories/insufficient-bbcode-sanitization | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28234", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T20:01:41.857651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:03:38.950Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g" }, { "name": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2" }, { "name": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2" }, { "name": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c 4.13.40" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T13:59:41.300Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g" }, { "name": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2" }, { "name": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2" }, { "name": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization" } ], "source": { "advisory": "GHSA-j55w-hjpj-825g", "discovery": "UNKNOWN" }, "title": "Contao has insufficient BBCode sanitizer" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28234", "datePublished": "2024-04-09T13:59:41.300Z", "dateReserved": "2024-03-07T14:33:30.034Z", "dateUpdated": "2024-08-02T00:48:49.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25768
Vulnerability from cvelistv5
Published
2020-10-07 20:37
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered.
References
▼ | URL | Tags |
---|---|---|
https://community.contao.org/en/forumdisplay.php?4-Announcements | x_refsource_MISC | |
https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.950Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://community.contao.org/en/forumdisplay.php?4-Announcements" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-09-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T20:37:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://community.contao.org/en/forumdisplay.php?4-Announcements" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://community.contao.org/en/forumdisplay.php?4-Announcements", "refsource": "MISC", "url": "https://community.contao.org/en/forumdisplay.php?4-Announcements" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-forms.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25768", "datePublished": "2020-10-07T20:37:52", "dateReserved": "2020-09-18T00:00:00", "dateUpdated": "2024-08-04T15:40:36.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19714
Vulnerability from cvelistv5
Published
2019-12-17 14:04
Modified
2024-08-05 02:25
Severity ?
EPSS score ?
Summary
Contao 4.8.4 and 4.8.5 has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news.html | x_refsource_MISC | |
https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.8.4 and 4.8.5 has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-17T14:04:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19714", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.8.4 and 4.8.5 has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news.html", "refsource": "MISC", "url": "https://contao.org/en/news.html" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19714", "datePublished": "2019-12-17T14:04:03", "dateReserved": "2019-12-11T00:00:00", "dateUpdated": "2024-08-05T02:25:12.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45612
Vulnerability from cvelistv5
Published
2024-09-17 18:29
Modified
2024-09-18 14:09
Severity ?
EPSS score ?
Summary
Insert tag injection via canonical URL in Contao
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "contao", "vendor": "contao", "versions": [ { "lessThan": "4.13.49", "status": "affected", "version": "4.13.0", "versionType": "custom" }, { "lessThan": "5.3.15", "status": "affected", "version": "5.0.0", "versionType": "custom" }, { "lessThan": "5.4.3", "status": "affected", "version": "5.4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45612", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T14:06:58.302616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T14:09:48.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.13.0, \u003c 4.13.49" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.15" }, { "status": "affected", "version": "\u003e= 5.4.0, \u003c 5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T18:29:27.210Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls" } ], "source": { "advisory": "GHSA-2xpq-xp6c-5mgj", "discovery": "UNKNOWN" }, "title": "Insert tag injection via canonical URL in Contao" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45612", "datePublished": "2024-09-17T18:29:27.210Z", "dateReserved": "2024-09-02T16:00:02.425Z", "dateUpdated": "2024-09-18T14:09:48.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19712
Vulnerability from cvelistv5
Published
2019-12-17 13:59
Modified
2024-08-05 02:25
Severity ?
EPSS score ?
Summary
Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news.html | x_refsource_MISC | |
https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-17T13:59:38", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19712", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news.html", "refsource": "MISC", "url": "https://contao.org/en/news.html" }, { "name": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19712", "datePublished": "2019-12-17T13:59:38", "dateReserved": "2019-12-11T00:00:00", "dateUpdated": "2024-08-05T02:25:12.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29200
Vulnerability from cvelistv5
Published
2023-04-25 17:00
Modified
2025-02-03 19:37
Severity ?
EPSS score ?
Summary
contao/core-bundle has path traversal vulnerability in the file manager
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3 | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df | x_refsource_MISC | |
https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3" }, { "name": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df" }, { "name": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-29200", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T19:37:07.056816Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-03T19:37:13.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c 4.9.40" }, { "status": "affected", "version": "\u003e= 4.10.0, \u003c 4.13.21" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.1.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T17:00:29.537Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3" }, { "name": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df" }, { "name": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager" } ], "source": { "advisory": "GHSA-fp7q-xhhw-6rj3", "discovery": "UNKNOWN" }, "title": "contao/core-bundle has path traversal vulnerability in the file manager" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-29200", "datePublished": "2023-04-25T17:00:29.537Z", "dateReserved": "2023-04-03T13:37:18.454Z", "dateUpdated": "2025-02-03T19:37:13.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24899
Vulnerability from cvelistv5
Published
2022-05-05 23:45
Modified
2025-04-23 18:29
Severity ?
EPSS score ?
Summary
Cross site scripting via canonical tag
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c | x_refsource_MISC | |
https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2 | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-24899", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:55:05.099859Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T18:29:58.265Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003c 4.13.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-05T23:45:13.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html" } ], "source": { "advisory": "GHSA-m8x6-6r63-qvj2", "discovery": "UNKNOWN" }, "title": "Cross site scripting via canonical tag", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24899", "STATE": "PUBLIC", "TITLE": "Cross site scripting via canonical tag" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contao", "version": { "version_data": [ { "version_value": "\u003c 4.13.3" } ] } } ] }, "vendor_name": "contao" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c", "refsource": "MISC", "url": "https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c" }, { "name": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2", "refsource": "CONFIRM", "url": "https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2" }, { "name": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html", "refsource": "MISC", "url": "https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html" } ] }, "source": { "advisory": "GHSA-m8x6-6r63-qvj2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24899", "datePublished": "2022-05-05T23:45:13.000Z", "dateReserved": "2022-02-10T00:00:00.000Z", "dateUpdated": "2025-04-23T18:29:58.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35955
Vulnerability from cvelistv5
Published
2021-08-12 14:33
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
Contao >=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html | x_refsource_MISC | |
https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:42.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao \u003e=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-12T14:33:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35955", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao \u003e=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html", "refsource": "MISC", "url": "https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html" }, { "name": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp", "refsource": "MISC", "url": "https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35955", "datePublished": "2021-08-12T14:33:44", "dateReserved": "2021-06-29T00:00:00", "dateUpdated": "2024-08-04T00:47:42.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4383
Vulnerability from cvelistv5
Published
2020-01-29 14:42
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
contao prior to 2.11.4 has a sql injection vulnerability
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/08/31/14 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "prior to 2.11" } ] } ], "descriptions": [ { "lang": "en", "value": "contao prior to 2.11.4 has a sql injection vulnerability" } ], "problemTypes": [ { "descriptions": [ { "description": "SQL injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-29T14:42:06", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4383", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contao", "version": { "version_data": [ { "version_value": "prior to 2.11" } ] } } ] }, "vendor_name": "contao" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "contao prior to 2.11.4 has a sql injection vulnerability" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SQL injection" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openwall.com/lists/oss-security/2012/08/31/14", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/14" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4383", "datePublished": "2020-01-29T14:42:06", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-5478
Vulnerability from cvelistv5
Published
2023-09-21 00:00
Modified
2024-09-24 18:43
Severity ?
EPSS score ?
Summary
Contao 3.x before 3.5.32 allows XSS via the unsubscribe module in the frontend newsletter extension.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:40:50.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core/CVE-2018-5478.yaml" }, { "tags": [ "x_transferred" ], "url": "https://security.snyk.io/vuln/SNYK-PHP-CONTAOCORE-70397" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-5478", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:43:11.768607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:43:21.305Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 3.x before 3.5.32 allows XSS via the unsubscribe module in the frontend newsletter extension." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-21T05:12:18.942696", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core/CVE-2018-5478.yaml" }, { "url": "https://security.snyk.io/vuln/SNYK-PHP-CONTAOCORE-70397" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-5478", "datePublished": "2023-09-21T00:00:00", "dateReserved": "2018-01-12T00:00:00", "dateUpdated": "2024-09-24T18:43:21.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45604
Vulnerability from cvelistv5
Published
2024-09-17 19:56
Modified
2024-09-18 13:09
Severity ?
EPSS score ?
Summary
Directory traversal in the file selector widget in contao/core-bundle
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-4p75-5p53-65m9 | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/directory-traversal-in-the-fileselector-widget | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45604", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:09:34.002818Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:09:48.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003c 4.13.49" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:56:02.588Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-4p75-5p53-65m9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4p75-5p53-65m9" }, { "name": "https://contao.org/en/security-advisories/directory-traversal-in-the-fileselector-widget", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/directory-traversal-in-the-fileselector-widget" } ], "source": { "advisory": "GHSA-4p75-5p53-65m9", "discovery": "UNKNOWN" }, "title": "Directory traversal in the file selector widget in contao/core-bundle" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45604", "datePublished": "2024-09-17T19:56:02.588Z", "dateReserved": "2024-09-02T16:00:02.424Z", "dateUpdated": "2024-09-18T13:09:48.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35210
Vulnerability from cvelistv5
Published
2021-06-23 09:34
Modified
2024-08-04 00:33
Severity ?
EPSS score ?
Summary
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
References
▼ | URL | Tags |
---|---|---|
https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html | x_refsource_CONFIRM | |
https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-23T09:34:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35210", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html", "refsource": "CONFIRM", "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html" }, { "name": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7", "refsource": "CONFIRM", "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35210", "datePublished": "2021-06-23T09:34:44", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-08-04T00:33:51.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37626
Vulnerability from cvelistv5
Published
2021-08-11 22:20
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
PHP file inclusion via insert tags
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr | x_refsource_CONFIRM | |
https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.4.56" }, { "status": "affected", "version": "\u003e= 4.5.0, \u003c 4.9.18" }, { "status": "affected", "version": "\u003e= 4.10.0, \u003c 4.11.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-11T22:20:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html" } ], "source": { "advisory": "GHSA-r6mv-ppjc-4hgr", "discovery": "UNKNOWN" }, "title": "PHP file inclusion via insert tags", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37626", "STATE": "PUBLIC", "TITLE": "PHP file inclusion via insert tags" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "contao", "version": { "version_data": [ { "version_value": "\u003e= 4.0.0, \u003c 4.4.56" }, { "version_value": "\u003e= 4.5.0, \u003c 4.9.18" }, { "version_value": "\u003e= 4.10.0, \u003c 4.11.7" } ] } } ] }, "vendor_name": "contao" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr", "refsource": "CONFIRM", "url": "https://github.com/contao/contao/security/advisories/GHSA-r6mv-ppjc-4hgr" }, { "name": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html", "refsource": "MISC", "url": "https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html" } ] }, "source": { "advisory": "GHSA-r6mv-ppjc-4hgr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37626", "datePublished": "2021-08-11T22:20:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-28191
Vulnerability from cvelistv5
Published
2024-04-09 13:54
Modified
2024-08-02 00:48
Severity ?
EPSS score ?
Summary
Contao may have unencoded insert tags in the frontend
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28191", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T16:07:38.376776Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-29T16:07:45.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8" }, { "name": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919" }, { "name": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.13.40" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T13:57:41.636Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8" }, { "name": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919" }, { "name": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b" }, { "name": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator" } ], "source": { "advisory": "GHSA-747v-52c4-8vj8", "discovery": "UNKNOWN" }, "title": "Contao may have unencoded insert tags in the frontend" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28191", "datePublished": "2024-04-09T13:54:22.129Z", "dateReserved": "2024-03-06T17:35:00.859Z", "dateUpdated": "2024-08-02T00:48:49.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36806
Vulnerability from cvelistv5
Published
2023-07-25 18:47
Modified
2025-02-13 16:56
Severity ?
EPSS score ?
Summary
Contao cross site scripting vulnerability via input unit widget
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:01:08.842Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x" }, { "name": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4" }, { "name": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b" }, { "name": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32" }, { "tags": [ "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2023-0020/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:contao:contao:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "contao", "vendor": "contao", "versions": [ { "lessThanOrEqual": "4.0.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.9.42", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "4.10.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.13.28", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "5.0.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "5.1.10", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-36806", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T18:55:31.237529Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T18:59:20.202Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.9.42" }, { "status": "affected", "version": "\u003e= 4.10.0, \u003c 4.13.28" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.1.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify headline fields, or other fields using the input unit widget. Contao 4.9.42, 4.13.28, and 5.1.10 have a patch for this issue. As a workaround, disable the login for all untrusted back end users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-21T00:01:30.770Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x" }, { "name": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4" }, { "name": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b" }, { "name": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32" }, { "url": "https://herolab.usd.de/security-advisories/usd-2023-0020/" } ], "source": { "advisory": "GHSA-4gpr-p634-922x", "discovery": "UNKNOWN" }, "title": "Contao cross site scripting vulnerability via input unit widget" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36806", "datePublished": "2023-07-25T18:47:34.415Z", "dateReserved": "2023-06-27T15:43:18.382Z", "dateUpdated": "2025-02-13T16:56:24.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-28190
Vulnerability from cvelistv5
Published
2024-04-09 13:48
Modified
2024-08-02 00:48
Severity ?
EPSS score ?
Summary
Contao core bundle vulnerable to cross site scripting in the file manager
References
▼ | URL | Tags |
---|---|---|
https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf | x_refsource_CONFIRM | |
https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce | x_refsource_MISC | |
https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d | x_refsource_MISC | |
https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-28190", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T17:12:31.297580Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:03:30.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf" }, { "name": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce" }, { "name": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d" }, { "name": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "contao", "vendor": "contao", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.13.40" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-09T13:57:49.326Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf" }, { "name": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce" }, { "name": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d" }, { "name": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager", "tags": [ "x_refsource_MISC" ], "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager" } ], "source": { "advisory": "GHSA-v24p-7p4j-qvvf", "discovery": "UNKNOWN" }, "title": "Contao core bundle vulnerable to cross site scripting in the file manager" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28190", "datePublished": "2024-04-09T13:48:46.324Z", "dateReserved": "2024-03-06T17:35:00.859Z", "dateUpdated": "2024-08-02T00:48:49.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }