Lucene search

K
githubGitHub Advisory DatabaseGHSA-HQ5M-MQMX-FW6M
HistoryAug 23, 2021 - 7:41 p.m.

Privilege escalation via form generator

2021-08-2319:41:22
CWE-269
GitHub Advisory Database
github.com
27

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

42.8%

Impact

It is possible for untrusted users to gain administrator rights with the form generator.

Installations are only affected if there are untrusted back end users with access to the form generator.

Patches

Update to Contao 4.4.56, 4.9.18 or 4.11.7.

Workarounds

Disable the form generator or disable the login for untrusted back end users.

References

https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator

For more information

If you have any questions or comments about this advisory, open an issue in contao/contao.

Affected configurations

Vulners
Node
contaocontaoRange<4.11.7
OR
contaocontaoRange<4.9.18
OR
contaocontaoRange<4.4.56
OR
contaocontaoRange<4.11.7
OR
contaocontaoRange<4.9.18
OR
contaocontaoRange<4.4.56

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

42.8%

Related for GHSA-HQ5M-MQMX-FW6M