logo

CVE-2021-32697 neos/form

Package

Manager: composer
Name: neos/form
Vulnerable Version: >=1.2.0 <4.3.3 || >=5.0.0 <5.0.9 || >=5.1.0 <5.1.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00396 pctl0.59597

Details

Form validation can be skipped ### Impact By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. ### Patches https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246 ### Workarounds Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. ### References This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567 Original report: https://tickets.neos.io/#ticket/zoom/411 (internal)

Metadata

Created: 2021-06-22T15:15:08Z
Modified: 2021-07-29T14:34:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-m5vx-8chx-qvmm/GHSA-m5vx-8chx-qvmm.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-m5vx-8chx-qvmm
Finding: F184
Auto approve: 1