CVE-2024-45592 – damienharper/auditor-bundle
Package
Manager: composer
Name: damienharper/auditor-bundle
Vulnerable Version: >=0 <5.2.6
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L
EPSS: 0.00106 pctl0.29364
Details
auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped ### Summary Unescaped entity property enables Javascript injection. ### Details I think this is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed. ### PoC - clone example project https://github.com/DamienHarper/auditor-bundle-demo - create author with FullName <script>alert()</script> - delete author - view audit of authors - alert is displayed ### Impact persistent XSS. JS can be injected and executed.
Metadata
Created: 2024-09-10T15:53:10Z
Modified: 2024-11-18T16:27:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-78vg-7v27-hj67/GHSA-78vg-7v27-hj67.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-78vg-7v27-hj67
Finding: F425
Auto approve: 1