logo

CVE-2021-37627 contao/core-bundle

Package

Manager: composer
Name: contao/core-bundle
Vulnerable Version: >=4.0.0 <4.4.56 || >=4.5.0 <4.9.18 || >=4.10.0 <4.11.7

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00485 pctl0.64371

Details

Privilege escalation via form generator ### Impact It is possible for untrusted users to gain administrator rights with the form generator. Installations are only affected if there are untrusted back end users with access to the form generator. ### Patches Update to Contao 4.4.56, 4.9.18 or 4.11.7. ### Workarounds Disable the form generator or disable the login for untrusted back end users. ### References https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).

Metadata

Created: 2021-08-23T19:41:22Z
Modified: 2024-04-22T18:40:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-hq5m-mqmx-fw6m/GHSA-hq5m-mqmx-fw6m.json
CWE IDs: ["CWE-269"]
Alternative ID: GHSA-hq5m-mqmx-fw6m
Finding: F159
Auto approve: 1