logo

CVE-2022-25769 mautic/core

Package

Manager: composer
Name: mautic/core
Vulnerable Version: >=0 <3.3.5 || >=4.0.0 <4.2.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00151 pctl0.36356

Details

Improper regex in htaccess file ### Impact the default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application. This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path. ### Patches Please upgrade to 3.3.5 or 4.2.0 ### Workarounds No ### References - Release post: https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic - Internally tracked under MST-32 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)

Metadata

Created: 2022-03-01T22:05:34Z
Modified: 2022-03-01T22:05:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-mj6m-246h-9w56/GHSA-mj6m-246h-9w56.json
CWE IDs: []
Alternative ID: GHSA-mj6m-246h-9w56
Finding: F184
Auto approve: 1