ghsa-h58v-c6rf-g9f7
Vulnerability from github
Published
2021-07-01 17:00
Modified
2025-04-17 12:45
Summary
Cross site scripting in the system log
Details

Impact

It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.

Patches

Update to Contao 4.9.16 or 4.11.5.

Workarounds

Disable the system log module in the back end for all users (especially admin users).

References

https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021

For more information

If you have any questions or comments about this advisory, open an issue in contao/contao.

Show details on source website


{
  "affected": [
    {
      "package": {
        "ecosystem": "Packagist",
        "name": "contao/core-bundle"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "4.5.0"
            },
            {
              "fixed": "4.9.16"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Packagist",
        "name": "contao/core-bundle"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "4.10.0"
            },
            {
              "fixed": "4.11.5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Packagist",
        "name": "contao/contao"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "4.5.0"
            },
            {
              "fixed": "4.9.16"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Packagist",
        "name": "contao/contao"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "4.10.0"
            },
            {
              "fixed": "4.11.5"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2021-35210"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2021-06-23T20:24:28Z",
    "nvd_published_at": "2021-06-23T11:15:00Z",
    "severity": "MODERATE"
  },
  "details": "### Impact\n\nIt is possible to inject code into the `tl_log` table that will be executed in the browser when the system log is called in the back end.\n\n### Patches\n\nUpdate to Contao 4.9.16 or 4.11.5.\n\n### Workarounds\n\nDisable the system log module in the back end for all users (especially admin users).\n\n### References\n\nhttps://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021\n\n### For more information\n\nIf you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).",
  "id": "GHSA-h58v-c6rf-g9f7",
  "modified": "2025-04-17T12:45:28Z",
  "published": "2021-07-01T17:00:04Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35210"
    },
    {
      "type": "WEB",
      "url": "https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html"
    },
    {
      "type": "WEB",
      "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/contao/CVE-2021-35210.yaml"
    },
    {
      "type": "WEB",
      "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2021-35210.yaml"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/contao/contao"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Cross site scripting in the system log"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.