CVE-2022-24749
Basic Cross-site Scripting and Unrestricted Upload of File with Dangerous Type in Sylius
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround.
Sylius es una plataforma de comercio electrónico de código abierto. En versiones anteriores a 1.9.10, 1.10.11 y 1.11.2, es posible cargar un archivo SVG que contenga código de tipo cross-site scripting (XSS) en el panel de administración. Para llevar a cabo un ataque de tipo XSS, el propio archivo tiene que abrirse en una nueva tarjeta o cargarse fuera de la etiqueta IMG. El problema es aplicado tanto a los archivos abiertos en el panel de administración como a las páginas de la tienda. El problema está corregido en versiones 1.9.10, 1.10.11 y 1.11.2. Como medida de mitigación, requiera una biblioteca que añada saneo de archivos al cargar y sobrescriba el servicio antes de escribir el archivo en el sistema de archivos. El aviso de seguridad de GitHub contiene información más específica sobre la mitigación
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-02-10 CVE Reserved
- 2022-03-14 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-10-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
- CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/Sylius/Sylius/releases/tag/v1.10.11 | Third Party Advisory | |
https://github.com/Sylius/Sylius/releases/tag/v1.11.2 | Third Party Advisory | |
https://github.com/Sylius/Sylius/releases/tag/v1.9.10 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sylius Search vendor "Sylius" | Sylius Search vendor "Sylius" for product "Sylius" | < 1.9.10 Search vendor "Sylius" for product "Sylius" and version " < 1.9.10" | - |
Affected
| ||||||
Sylius Search vendor "Sylius" | Sylius Search vendor "Sylius" for product "Sylius" | >= 1.10.0 < 1.10.11 Search vendor "Sylius" for product "Sylius" and version " >= 1.10.0 < 1.10.11" | - |
Affected
| ||||||
Sylius Search vendor "Sylius" | Sylius Search vendor "Sylius" for product "Sylius" | >= 1.11.0 < 1.11.2 Search vendor "Sylius" for product "Sylius" and version " >= 1.11.0 < 1.11.2" | - |
Affected
|