// For flags

CVE-2022-24749

Basic Cross-site Scripting and Unrestricted Upload of File with Dangerous Type in Sylius

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Sylius is an open source eCommerce platform. In versions prior to 1.9.10, 1.10.11, and 1.11.2, it is possible to upload an SVG file containing cross-site scripting (XSS) code in the admin panel. In order to perform a XSS attack, the file itself has to be open in a new card or loaded outside of the IMG tag. The problem applies both to the files opened on the admin panel and shop pages. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. As a workaround, require a library that adds on-upload file sanitization and overwrite the service before writing the file to the filesystem. The GitHub Security Advisory contains more specific information about the workaround.

Sylius es una plataforma de comercio electrónico de código abierto. En versiones anteriores a 1.9.10, 1.10.11 y 1.11.2, es posible cargar un archivo SVG que contenga código de tipo cross-site scripting (XSS) en el panel de administración. Para llevar a cabo un ataque de tipo XSS, el propio archivo tiene que abrirse en una nueva tarjeta o cargarse fuera de la etiqueta IMG. El problema es aplicado tanto a los archivos abiertos en el panel de administración como a las páginas de la tienda. El problema está corregido en versiones 1.9.10, 1.10.11 y 1.11.2. Como medida de mitigación, requiera una biblioteca que añada saneo de archivos al cargar y sobrescriba el servicio antes de escribir el archivo en el sistema de archivos. El aviso de seguridad de GitHub contiene información más específica sobre la mitigación

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-10 CVE Reserved
  • 2022-03-14 CVE Published
  • 2023-10-05 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
  • CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
< 1.9.10
Search vendor "Sylius" for product "Sylius" and version " < 1.9.10"
-
Affected
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
>= 1.10.0 < 1.10.11
Search vendor "Sylius" for product "Sylius" and version " >= 1.10.0 < 1.10.11"
-
Affected
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
>= 1.11.0 < 1.11.2
Search vendor "Sylius" for product "Sylius" and version " >= 1.11.0 < 1.11.2"
-
Affected