gsd-2022-24749
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-24749", "description": "Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround.", "id": "GSD-2022-24749" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-24749" ], "details": "Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround.", "id": "GSD-2022-24749", "modified": "2023-12-13T01:19:42.643549Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24749", "STATE": "PUBLIC", "TITLE": "Basic Cross-site Scripting and Unrestricted Upload of File with Dangerous Type in Sylius" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sylius", "version": { "version_data": [ { "version_value": "\u003c 1.9.10" }, { "version_value": "\u003e= 1.10.0, \u003c 1.10.11" }, { "version_value": "\u003e= 1.11.0, \u003c 1.11.2" } ] } } ] }, "vendor_name": "Sylius" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-434: Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Sylius/Sylius/releases/tag/v1.10.11", "refsource": "MISC", "url": "https://github.com/Sylius/Sylius/releases/tag/v1.10.11" }, { "name": "https://github.com/Sylius/Sylius/releases/tag/v1.11.2", "refsource": "MISC", "url": "https://github.com/Sylius/Sylius/releases/tag/v1.11.2" }, { "name": "https://github.com/Sylius/Sylius/releases/tag/v1.9.10", "refsource": "MISC", "url": "https://github.com/Sylius/Sylius/releases/tag/v1.9.10" }, { "name": "https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj", "refsource": "CONFIRM", "url": "https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj" } ] }, "source": { "advisory": "GHSA-4qrp-27r3-66fj", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c1.9.10||\u003e=1.10.0,\u003c1.10.11||\u003e=1.11.0,\u003c1.11.2", "affected_versions": "All versions before 1.9.10, all versions starting from 1.10.0 before 1.10.11, all versions starting from 1.11.0 before 1.11.2", "cwe_ids": [ "CWE-1035", "CWE-434", "CWE-79", "CWE-80", "CWE-937" ], "date": "2022-03-18", "description": "Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround.", "fixed_versions": [ "1.9.10", "1.10.11", "1.11.2" ], "identifier": "CVE-2022-24749", "identifiers": [ "GHSA-4qrp-27r3-66fj", "CVE-2022-24749" ], "not_impacted": "All versions starting from 1.9.10 before 1.10.0, all versions starting from 1.10.11 before 1.11.0, all versions starting from 1.11.2", "package_slug": "packagist/sylius/sylius", "pubdate": "2022-03-14", "solution": "Upgrade to versions 1.9.10, 1.10.11, 1.11.2 or above.", "title": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "urls": [ "https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj", "https://github.com/Sylius/Sylius/releases/tag/v1.10.11", "https://github.com/Sylius/Sylius/releases/tag/v1.11.2", "https://github.com/Sylius/Sylius/releases/tag/v1.9.10", "https://nvd.nist.gov/vuln/detail/CVE-2022-24749", "https://github.com/advisories/GHSA-4qrp-27r3-66fj" ], "uuid": "3ca33497-90a5-49d7-925c-bf40d15f0062" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.9.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.10.11", "versionStartIncluding": "1.10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.11.2", "versionStartIncluding": "1.11.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24749" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj", "refsource": "CONFIRM", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj" }, { "name": "https://github.com/Sylius/Sylius/releases/tag/v1.11.2", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sylius/Sylius/releases/tag/v1.11.2" }, { "name": "https://github.com/Sylius/Sylius/releases/tag/v1.9.10", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sylius/Sylius/releases/tag/v1.9.10" }, { "name": "https://github.com/Sylius/Sylius/releases/tag/v1.10.11", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sylius/Sylius/releases/tag/v1.10.11" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2022-03-22T15:08Z", "publishedDate": "2022-03-14T22:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…