2024-10-03 16:03:18 +00:00
{
"id" : "CVE-2024-47618" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2024-10-03T15:15:15.147" ,
2024-10-08 16:03:21 +00:00
"lastModified" : "2024-10-08T14:31:08.180" ,
"vulnStatus" : "Analyzed" ,
2024-10-03 16:03:18 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Sulu is a PHP content management system. Sulu is vulnerable against XSS whereas a low privileged user with access to the \u201cMedia\u201d section can upload an SVG file with a malicious payload. Once uploaded and accessed, the malicious javascript will be executed on the victims\u2019 (other users including admins) browsers. This issue is fixed in 2.6.5."
2024-10-04 14:03:27 +00:00
} ,
{
"lang" : "es" ,
"value" : "Sulu es un sistema de gesti\u00f3n de contenido PHP. Sulu es vulnerable a XSS, ya que un usuario con pocos privilegios y acceso a la secci\u00f3n \u201cMedios\u201d puede cargar un archivo SVG con una carga maliciosa. Una vez cargado y accedido, el c\u00f3digo JavaScript malicioso se ejecutar\u00e1 en los navegadores de las v\u00edctimas (otros usuarios, incluidos los administradores). Este problema se solucion\u00f3 en la versi\u00f3n 2.6.5."
2024-10-03 16:03:18 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "PASSIVE" ,
"vulnerableSystemConfidentiality" : "NONE" ,
"vulnerableSystemIntegrity" : "NONE" ,
"vulnerableSystemAvailability" : "NONE" ,
"subsequentSystemConfidentiality" : "LOW" ,
"subsequentSystemIntegrity" : "LOW" ,
"subsequentSystemAvailability" : "NONE" ,
"exploitMaturity" : "NOT_DEFINED" ,
"confidentialityRequirements" : "NOT_DEFINED" ,
"integrityRequirements" : "NOT_DEFINED" ,
"availabilityRequirements" : "NOT_DEFINED" ,
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
"modifiedVulnerableSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedVulnerableSystemIntegrity" : "NOT_DEFINED" ,
"modifiedVulnerableSystemAvailability" : "NOT_DEFINED" ,
"modifiedSubsequentSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedSubsequentSystemIntegrity" : "NOT_DEFINED" ,
"modifiedSubsequentSystemAvailability" : "NOT_DEFINED" ,
"safety" : "NOT_DEFINED" ,
"automatable" : "NOT_DEFINED" ,
"recovery" : "NOT_DEFINED" ,
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
"providerUrgency" : "NOT_DEFINED" ,
"baseScore" : 5.1 ,
"baseSeverity" : "MEDIUM"
}
}
2024-10-08 16:03:21 +00:00
] ,
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.4 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.3 ,
"impactScore" : 2.7
}
2024-10-03 16:03:18 +00:00
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2024-10-08 16:03:21 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*" ,
"versionStartExcluding" : "2.0.0" ,
"versionEndExcluding" : "2.6.5" ,
"matchCriteriaId" : "7B65140D-3A0E-4E34-8E65-36936BF03195"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sulu:sulu:2.0.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "22FC3A80-4377-439B-93A6-8FF2EB7BA9F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sulu:sulu:2.0.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "712ADF94-5F2D-4347-B6E8-704FBBF097DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sulu:sulu:2.0.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BD27DD5-D0BB-40A9-AFD7-881B66E54D2B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sulu:sulu:2.0.0:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "A8043D82-A8C5-4927-B605-C72D6947A5AB"
}
]
}
]
}
] ,
2024-10-03 16:03:18 +00:00
"references" : [
{
"url" : "https://github.com/sulu/sulu/commit/ca72f75eebe41ea7726624d8aea7da6c425f1eb9" ,
2024-10-08 16:03:21 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2024-10-03 16:03:18 +00:00
} ,
{
"url" : "https://github.com/sulu/sulu/security/advisories/GHSA-255w-87rh-rg44" ,
2024-10-08 16:03:21 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
2024-10-03 16:03:18 +00:00
}
]
}