CVE-2022-25769 – mautic/core
Package
Manager: composer
Name: mautic/core
Vulnerable Version: >=0 <3.3.5 || >=4.0.0 <4.2.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00151 pctl0.36356
Details
Improper regex in htaccess file ### Impact the default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application. This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path. ### Patches Please upgrade to 3.3.5 or 4.2.0 ### Workarounds No ### References - Release post: https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic - Internally tracked under MST-32 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
Metadata
Created: 2022-03-01T22:05:34Z
Modified: 2022-03-01T22:05:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-mj6m-246h-9w56/GHSA-mj6m-246h-9w56.json
CWE IDs: []
Alternative ID: GHSA-mj6m-246h-9w56
Finding: F184
Auto approve: 1