Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-37473
HistoryJul 14, 2023 - 8:00 p.m.

CVE-2023-37473 Limited code execution in zenstruck/collections

2023-07-1420:00:16
CWE-74
GitHub_M
www.cve.org
1
cve-2023-37473
code execution
zenstruck/collections
user input
entityrepository::find()
query()
upgrade

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.002

Percentile

52.1%

zenstruck/collections is a set of helpers for iterating/paginating/filtering collections. Passing callable strings (ie system) caused the function to be executed. This would result in a limited subset of specific user input being executed as if it were code. This issue has been addressed in commit f4b1c48820 and included in release version 0.2.1. Users are advised to upgrade. Users unable to upgrade should ensure that user input is not passed to either EntityRepository::find() or query().

CNA Affected

[
  {
    "vendor": "zenstruck",
    "product": "collection",
    "versions": [
      {
        "version": "< 0.2.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.002

Percentile

52.1%

Related for CVELIST:CVE-2023-37473