Lucene search

K
cve[email protected]CVE-2024-28190
HistoryApr 09, 2024 - 2:15 p.m.

CVE-2024-28190

2024-04-0914:15:08
CWE-79
web.nvd.nist.gov
30
contao cms
file upload
vulnerability
patch
version 4.13.40
version 5.3.4
tooltips
popups
back end
front end
filenames
malicious code
upload fields
forms
workaround
disable

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users.

Affected configurations

Vulners
Node
contaocontaoRange4.0.04.13.40
OR
contaocontaoRange5.0.05.3.4
VendorProductVersionCPE
contaocontao*cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*
contaocontao*cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "contao",
    "product": "contao",
    "versions": [
      {
        "version": ">= 4.0.0, < 4.13.40",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, < 5.3.4",
        "status": "affected"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Related for CVE-2024-28190