Page 2 of 23 results (0.013 seconds)

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 0

25 Apr 2023 — Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds. • https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

05 May 2022 — Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings. Contao es un potente CMS de código abierto que permite crear sitios web profesionales y aplicaciones web escalables. En las versiones de Contao anteriores a 4.13.3 es posible inyectar código en la etiqueta canónica. • https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 3EXPL: 0

12 Aug 2021 — Contao >=4.0.0 allows backend XSS via HTML attributes to an HTML field. Fixed in 4.4.56, 4.9.18, 4.11.7. Contao versiones posteriores a 4.0.0 incluyéndola, permite un ataque de tipo XSS de backend por medio de atributos HTML a un campo HTML. Corregido en versiones 4.4.56, 4.9.18, 4.11.7 • https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.0EPSS: 0%CPEs: 12EXPL: 0

11 Aug 2021 — Contao is an open source CMS that allows creation of websites and scalable web applications. In affected versions it is possible to gain privileged rights in the Contao back end. Installations are only affected if they have untrusted back end users who have access to the form generator. All users are advised to update to Contao 4.4.56, 4.9.18 or 4.11.7. As a workaround users may disable the form generator or disable the login for untrusted back end users. • https://contao.org/en/security-advisories/privilege-escalation-with-the-form-generator.html • CWE-269: Improper Privilege Management •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

11 Aug 2021 — Contao is an open source CMS that allows you to create websites and scalable web applications. In affected versions it is possible to load PHP files by entering insert tags in the Contao back end. Installations are only affected if they have untrusted back end users who have the rights to modify fields that are shown in the front end. Update to Contao 4.4.56, 4.9.18 or 4.11.7 to resolve. If you cannot update then disable the login for untrusted back end users. • https://contao.org/en/security-advisories/php-file-inclusion-via-insert-tags.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

23 Jun 2021 — Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end. Contao versiones 4.5.x hasta 4.9.x anteriores a 4.9.16, y versiones 4.10.x hasta 4.11.x anteriores a 4.11.5, permite un ataque de tipo XSS. Es posible inyectar código en la tabla tl_log que será ejecutada en el navegador cuando el registro del sistema es llamado en el back end • https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

07 Oct 2020 — Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered. Contao versiones anteriores a 4.4.52, versiones 4.9.x anteriores a 4.9.6 y versiones 4.10.x anteriores a 4.10,1 presentan una Comprobación de Entrada Inapropiada. Es posible inyectar etiquetas de inserción en formularios del front end que serán reemplazados cuando la página es renderizada • https://community.contao.org/en/forumdisplay.php?4-Announcements • CWE-20: Improper Input Validation CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 6.1EPSS: 0%CPEs: 7EXPL: 0

16 Mar 2020 — Contao before 4.5.7 has XSS in the system log. Contao versiones anteriores a 4.5.7, presenta una vulnerabilidad de tipo XSS en el registro del sistema. • https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

29 Jan 2020 — contao prior to 2.11.4 has a sql injection vulnerability contao versiones anteriores a 2.11.4, presenta una vulnerabilidad de inyección sql. • http://www.openwall.com/lists/oss-security/2012/08/31/14 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 9EXPL: 0

17 Dec 2019 — Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server. Contao versiones 4.0 hasta 4.8.5, permite una inclusión de archivos locales PHP. Un usuario del back-end con acceso al generador de formularios puede cargar archivos arbitrarios y ejecutarlos sobre el servidor. • https://contao.org/en/news.html • CWE-434: Unrestricted Upload of File with Dangerous Type •