Skip to content

XSS vulnerability in installer

High
escopecz published GHSA-jrwm-pr9x-cgq3 May 23, 2022

Package

composer Mautic (Composer)

Affected versions

< 4.3.0

Patched versions

4.3.0

Description

⚠️ After this security fix was released we identified an issue which has been resolved in releasing hotfix version 4.3.1.

Impact

Mautic allows you to install the application via an installer.

The installer logic doesn't sufficiently sanitise the input of the install information, which may lead to vulnerable situation.

This vulnerability is mitigated by the fact that the attacker needs to have access to the install process.

Patches

Please upgrade to 4.3.1

Workarounds

None.

References

  • Internally tracked under MST-28

For more information

If you have any questions or comments about this advisory:

Severity

High
7.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
High
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

CVE ID

CVE-2021-27914

Weaknesses

Credits