logo

CVE-2024-45592 damienharper/auditor-bundle

Package

Manager: composer
Name: damienharper/auditor-bundle
Vulnerable Version: >=0 <5.2.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L

EPSS: 0.00106 pctl0.29364

Details

auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped ### Summary Unescaped entity property enables Javascript injection. ### Details I think this is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed. ### PoC - clone example project https://github.com/DamienHarper/auditor-bundle-demo - create author with FullName <script>alert()</script> - delete author - view audit of authors - alert is displayed ### Impact persistent XSS. JS can be injected and executed.

Metadata

Created: 2024-09-10T15:53:10Z
Modified: 2024-11-18T16:27:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-78vg-7v27-hj67/GHSA-78vg-7v27-hj67.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-78vg-7v27-hj67
Finding: F425
Auto approve: 1