logo

CVE-2024-45612 contao/core-bundle

Package

Manager: composer
Name: contao/core-bundle
Vulnerable Version: >=4.13.0 <4.13.49 || >=5.0.0 <5.3.15 || >=5.4.0 <5.4.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00228 pctl0.45506

Details

Contao affected by insert tag injection via canonical URL ### Impact It is possible to inject insert tags in canonical URLs which will be replaced when the page is rendered. ### Patches Update to Contao 4.13.49, 5.3.15 or 5.4.3. ### Workarounds Disable canonical tags in the settings of the website root page. ### References https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).

Metadata

Created: 2024-09-17T14:59:02Z
Modified: 2024-09-23T21:33:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-2xpq-xp6c-5mgj/GHSA-2xpq-xp6c-5mgj.json
CWE IDs: ["CWE-20", "CWE-74", "CWE-79"]
Alternative ID: GHSA-2xpq-xp6c-5mgj
Finding: F184
Auto approve: 1