Lucene search

K
cve[email protected]CVE-2020-5218
HistoryJan 27, 2020 - 9:15 p.m.

CVE-2020-5218

2020-01-2721:15:11
CWE-444
web.nvd.nist.gov
42
sylius
cve-2020-5218
unauthorized access
security vulnerability
patch
nvd

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

4.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

4.7

Confidence

High

EPSS

0.001

Percentile

19.4%

Affected versions of Sylius give attackers the ability to switch channels via the _channel_code GET parameter in production environments. This was meant to be enabled only when kernel.debug is set to true. However, if no sylius_channel.debug is set explicitly in the configuration, the default value which is kernel.debug will be not resolved and cast to boolean, enabling this debug feature even if that parameter is set to false. Patch has been provided for Sylius 1.3.x and newer - 1.3.16, 1.4.12, 1.5.9, 1.6.5. Versions older than 1.3 are not covered by our security support anymore.

Affected configurations

Vulners
NVD
Node
syliussyliusRange<1.3.13
OR
syliussyliusRange1.4.01.4.6
OR
syliussyliusRange1.5.01.5.1
OR
syliussyliusRange1.6.01.6.3
VendorProductVersionCPE
syliussylius*cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*
syliussylius*cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*
syliussylius*cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*
syliussylius*cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Sylius",
    "vendor": "Sylius",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.3.13"
      },
      {
        "status": "affected",
        "version": ">= 1.4.0, < 1.4.6"
      },
      {
        "status": "affected",
        "version": ">= 1.5.0, < 1.5.1"
      },
      {
        "status": "affected",
        "version": ">= 1.6.0, < 1.6.3"
      }
    ]
  }
]

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

4.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

4.7

Confidence

High

EPSS

0.001

Percentile

19.4%