Skip to content

silverstripe/framework code execution vulnerability

High severity GitHub Reviewed Published May 27, 2024 to the GitHub Advisory Database

Package

composer silverstripe/framework (Composer)

Affected versions

>= 4.0.3-rc1, < 4.0.4
>= 4.1.0-rc1, < 4.1.1

Patched versions

4.0.4
4.1.1

Description

There is a vulnerability whereby arbitrary global functions may be executed if malicious user input is passed through to in the second argument of ViewableData::renderWith. This argument resolves associative arrays as template placeholders. This exploit requires that user code has been written which makes use of the second argument in renderWith and where user input is passed directly as a value in an associative array without sanitisation such as Convert::raw2xml().

ViewableData::customise is not vulnerable.

References

Published to the GitHub Advisory Database May 27, 2024
Reviewed May 27, 2024

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-vgxh-x8jv-hmff
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.