CVE-2020-11056 – barrelstrength/sprout-base-email
Package
Manager: composer
Name: barrelstrength/sprout-base-email
Vulnerable Version: >=0 <1.2.7
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
EPSS: 0.00557 pctl0.67193
Details
Potential Code Injection in Sprout Forms ### Impact A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code. ### Patches The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7` ### Workarounds Users unable to upgrade should update any Notification Emails to use the "Basic Notification (Sprout Email)" template and avoid using the "Basic Notification (Sprout Forms)" template or any custom templates that display Form Fields. ### References - See the release notes in the [CHANGELOG](https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical) - Credits to Paweł Hałdrzyński, Daniel Kalinowski from [ISEC.PL](https://isec.pl/) for discovery and responsible disclosure ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Sprout Forms repo](https://github.com/barrelstrength/craft-sprout-forms/issues) * Email us at [sprout@barrelstrengthdesign.com](mailto:sprout@barrelstrengthdesign.com)
Metadata
Created: 2020-05-08T21:00:02Z
Modified: 2021-10-27T17:00:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/05/GHSA-px8v-hxxx-2rgh/GHSA-px8v-hxxx-2rgh.json
CWE IDs: ["CWE-74", "CWE-94"]
Alternative ID: GHSA-px8v-hxxx-2rgh
Finding: F184
Auto approve: 1