Search criteria

3 vulnerabilities by neos

CVE-2023-37611 (GCVE-0-2023-37611)

Vulnerability from cvelistv5 – Published: 2023-09-18 00:00 – Updated: 2024-08-02 17:16
VLAI?
Summary
Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allows a remote authenticated attacker to execute arbitrary code via a crafted SVG file to the neos/management/media component.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:16:30.857Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/neos/neos-development-collection/pull/4812"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allows a remote authenticated attacker to execute arbitrary code via a crafted SVG file to the neos/management/media component."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T00:17:20.684759",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b"
        },
        {
          "url": "https://github.com/neos/neos-development-collection/pull/4812"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-37611",
    "datePublished": "2023-09-18T00:00:00",
    "dateReserved": "2023-07-10T00:00:00",
    "dateUpdated": "2024-08-02T17:16:30.857Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-30429 (GCVE-0-2022-30429)

Vulnerability from cvelistv5 – Published: 2022-06-02 17:18 – Updated: 2024-08-03 06:48
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Neos CMS allow attackers with the editor role or higher to inject arbitrary script or HTML code using the editor function, the deletion of assets, or a workspace title. The vulnerabilities were found in versions 3.3.29 and 8.0.1 and could also be present in all intermediate versions.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:48:36.400Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.neos.io/blog/xss-in-various-backend-modules.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://it-sec.de/unbekannte-schwachstellen-in-neos-cms/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Neos CMS allow attackers with the editor role or higher to inject arbitrary script or HTML code using the editor function, the deletion of assets, or a workspace title. The vulnerabilities were found in versions 3.3.29 and 8.0.1 and could also be present in all intermediate versions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-06-07T13:14:18",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.neos.io/blog/xss-in-various-backend-modules.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://it-sec.de/unbekannte-schwachstellen-in-neos-cms/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-30429",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Neos CMS allow attackers with the editor role or higher to inject arbitrary script or HTML code using the editor function, the deletion of assets, or a workspace title. The vulnerabilities were found in versions 3.3.29 and 8.0.1 and could also be present in all intermediate versions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.neos.io/blog/xss-in-various-backend-modules.html",
              "refsource": "MISC",
              "url": "https://www.neos.io/blog/xss-in-various-backend-modules.html"
            },
            {
              "name": "https://it-sec.de/unbekannte-schwachstellen-in-neos-cms/",
              "refsource": "MISC",
              "url": "https://it-sec.de/unbekannte-schwachstellen-in-neos-cms/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-30429",
    "datePublished": "2022-06-02T17:18:03",
    "dateReserved": "2022-05-09T00:00:00",
    "dateUpdated": "2024-08-03T06:48:36.400Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-32697 (GCVE-0-2021-32697)

Vulnerability from cvelistv5 – Published: 2021-06-21 18:15 – Updated: 2024-08-03 23:25
VLAI?
Title
Form validation can be skipped
Summary
neos/forms is an open source framework to build web forms. By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. Form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
neos form Affected: >= 1.2.0, < 4.3.3
Affected: >= 5.0.0, < 5.0.9
Affected: >= 5.1.0, < 5.1.3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:25:31.146Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/neos/form/releases/tag/5.1.3"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "form",
          "vendor": "neos",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 1.2.0, \u003c 4.3.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.0.0, \u003c 5.0.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.1.0, \u003c 5.1.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "neos/forms is an open source framework to build web forms. By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. Form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-21T18:15:13",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/neos/form/releases/tag/5.1.3"
        }
      ],
      "source": {
        "advisory": "GHSA-m5vx-8chx-qvmm",
        "discovery": "UNKNOWN"
      },
      "title": "Form validation can be skipped",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2021-32697",
          "STATE": "PUBLIC",
          "TITLE": "Form validation can be skipped"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "form",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003e= 1.2.0, \u003c 4.3.3"
                          },
                          {
                            "version_value": "\u003e= 5.0.0, \u003c 5.0.9"
                          },
                          {
                            "version_value": "\u003e= 5.1.0, \u003c 5.1.3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "neos"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "neos/forms is an open source framework to build web forms. By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. Form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567"
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20: Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm",
              "refsource": "CONFIRM",
              "url": "https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm"
            },
            {
              "name": "https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1",
              "refsource": "MISC",
              "url": "https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1"
            },
            {
              "name": "https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567",
              "refsource": "MISC",
              "url": "https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567"
            },
            {
              "name": "https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246",
              "refsource": "MISC",
              "url": "https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246"
            },
            {
              "name": "https://github.com/neos/form/releases/tag/5.1.3",
              "refsource": "MISC",
              "url": "https://github.com/neos/form/releases/tag/5.1.3"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-m5vx-8chx-qvmm",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-32697",
    "datePublished": "2021-06-21T18:15:13",
    "dateReserved": "2021-05-12T00:00:00",
    "dateUpdated": "2024-08-03T23:25:31.146Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}