logo

GHSA-945h-6vcv-pc8h sylius/admin-bundle

Package

Manager: composer
Name: sylius/admin-bundle
Vulnerable Version: >=1.0.0 <1.0.17 || >=1.1.0 <1.1.9 || >=1.2.0 <1.2.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

Sylius Admin Bundle Cross-Site Request Forgery vulnerability Sylius 1.0.0 to 1.0.16, 1.1.0 to 1.1.8, 1.2.0 to 1.2.1 versions of AdminBundle and ResourceBundle are affected by this security issue. This issue has been fixed in Sylius 1.0.17, 1.1.9 and 1.2.2. Development branch for 1.3 release has also been fixed. ### Description The following actions in the admin panel did not require a CSRF token: - marking order’s payment as completed - marking order’s payment as refunded - marking product review as accepted - marking product review as rejected ### Resolution The issue is fixed by adding a required CSRF token to those actions. We also fixed `ResourceController`‘s `applyStateMachineTransitionAction` method by adding a CSRF token check. If you use that action in the API context, you can disable it by adding `csrf_protection:` false to its routing configuration

Metadata

Created: 2024-05-29T18:50:26Z
Modified: 2024-05-29T18:50:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-945h-6vcv-pc8h/GHSA-945h-6vcv-pc8h.json
CWE IDs: []
Alternative ID: N/A
Finding: F007
Auto approve: 1