GHSA-296Q-RJ83-G9RQ
Vulnerability from github – Published: 2024-07-26 14:28 – Updated: 2024-09-23 19:12usd-2024-0009 | Reflected XSS in Oveleon Cookiebar
Details
Advisory ID: usd-2024-0009
Product: Cookiebar
Affected Version: 2.X
Vulnerability Type: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Security Risk: HIGH, CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N
Vendor URL: https://www.usd.de/
Vendor acknowledged vulnerability: Yes
Vendor Status: Fixed
CVE Number: Not requested yet
CVE Link: Not requested yet
First Published: Published
Last Update: 2024-07-29
Affected Component
The block function in CookiebarController.php.
Desciption
Oveleon's Cookiebar is an extension for the popular Contao CMS.
The block/locale endpoint does not properly sanitize the user-controlled locale input before including it in the backend's HTTP response, thereby causing reflected XSS.
Proof of Concept
The vulnerability could be triggered by entering the following Link:
https://[redacted].de/cookiebar/block/dens82w%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Ew9qt
n/[id]?redirect=https%3A%2F%2F[...]amp%3Biv_load_policy%3D3%26amp%3Bmo
destbranding%3D1%26amp%3Brel%3D0
It is likely related to the following function in the Oveleon Cookiebar source code:
/**
* Block content
*
* @Route("/cookiebar/block/{locale}/{id}", name="cookiebar_block")
*/
public function block(Request $request, string $locale, int $id): Response
{
System::loadLanguageFile('tl_cookiebar', $locale);
$this->framework->initialize();
$objCookie = CookieModel::findById($id);
if (null === $objCookie || null === $request->headers->get('referer'))
{
throw new PageNotFoundException();
}
$strUrl = $request->get('redirect');
// Protect against XSS attacks
if(!Validator::isUrl($strUrl))
{
return new Response('The redirect destination must be a valid URL.', Response::HTTP_BAD_REQUEST);
}
$objTemplate = new FrontendTemplate($objCookie->blockTemplate ?: 'ccb_element_blocker');
$objTemplate->language = $locale;
$objTemplate->id = $objCookie->id;
$objTemplate->title = $objCookie->title;
$objTemplate->type = $objCookie->type;
$objTemplate->iframeType = $objCookie->iframeType;
$objTemplate->description = $objCookie->blockDescription;
$objTemplate->redirect = $request->get('redirect');
$objTemplate->acceptAndDisplayLabel = $this->translator->trans('tl_cookiebar.acceptAndDisplayLabel', [], 'contao_default', $locale);
return $objTemplate->getResponse();
}
Fix
Sanitize the locale input to prevent XSS payloads from being executed in a user's browser.
References
- https://github.com/oveleon/contao-cookiebar/blob/2.x/src/Controller/CookiebarController.php
- https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
Timeline
- 2024-04-24: Vulnerability discovered by DR of usd AG.
- 2024-07-25: Probable cause of the vulnerability has been identified as Oveleon's Cookiebar Extension for Contao CMS.
- 2024-07-25: Vulnerability disclosed via GitHub Vulnerability Report.
Credits
This security vulnerability was identified by DR of usd AG.
About usd Security Advisories
In order to protect businesses against hackers and criminals, we always have to keep our skills and knowledge up to date. Thus, security research is just as important for our work as is building up a security community to promote the exchange of knowledge. After all, more security can only be achieved if many individuals take on the task.
Our CST Academy and our usd HeroLab are essential parts of our security mission. We share the knowledge we gain in our practical work and our research through training courses and publications. In this context, the usd HeroLab publishes a series of papers on new vulnerabilities and current security issues.
Always for the sake of our mission: "more security."
https://www.usd.de
Disclaimer
The information provided in this security advisory is provided "as is" and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible.
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "oveleon/contao-cookiebar"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "oveleon/contao-cookiebar"
},
"ranges": [
{
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.1.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-47069"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2024-07-26T14:28:26Z",
"nvd_published_at": "2024-09-23T16:15:07Z",
"severity": "MODERATE"
},
"details": "## usd-2024-0009 | Reflected XSS in Oveleon Cookiebar\n\n### Details\n**Advisory ID**: usd-2024-0009 \n**Product**: Cookiebar \n**Affected Version**: 2.X \n**Vulnerability Type**: CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) \n**Security Risk**: HIGH, CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N \n**Vendor URL**: https://www.usd.de/ \n**Vendor acknowledged vulnerability**: Yes \n**Vendor Status**: Fixed \n**CVE Number**: Not requested yet \n**CVE Link**: Not requested yet \n**First Published**: Published \n**Last Update**: 2024-07-29\n\n\n### Affected Component\n\nThe `block` function in `CookiebarController.php`.\n\n\n### Desciption\n\nOveleon\u0027s Cookiebar is an extension for the popular Contao CMS.\nThe `block/locale` endpoint does not properly sanitize the user-controlled `locale` input before including it in the backend\u0027s HTTP response, thereby causing reflected XSS.\n\n### Proof of Concept\nThe vulnerability could be triggered by entering the following Link:\n\n```\nhttps://[redacted].de/cookiebar/block/dens82w%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Ew9qt\nn/[id]?redirect=https%3A%2F%2F[...]amp%3Biv_load_policy%3D3%26amp%3Bmo\ndestbranding%3D1%26amp%3Brel%3D0\n```\n\nIt is likely related to the following function in the Oveleon Cookiebar source code:\n\n```php\n /**\n * Block content\n *\n * @Route(\"/cookiebar/block/{locale}/{id}\", name=\"cookiebar_block\")\n */\n public function block(Request $request, string $locale, int $id): Response\n {\n System::loadLanguageFile(\u0027tl_cookiebar\u0027, $locale);\n\n $this-\u003eframework-\u003einitialize();\n\n $objCookie = CookieModel::findById($id);\n\n if (null === $objCookie || null === $request-\u003eheaders-\u003eget(\u0027referer\u0027))\n {\n throw new PageNotFoundException();\n }\n\n $strUrl = $request-\u003eget(\u0027redirect\u0027);\n\n // Protect against XSS attacks\n if(!Validator::isUrl($strUrl))\n {\n return new Response(\u0027The redirect destination must be a valid URL.\u0027, Response::HTTP_BAD_REQUEST);\n }\n\n $objTemplate = new FrontendTemplate($objCookie-\u003eblockTemplate ?: \u0027ccb_element_blocker\u0027);\n\n $objTemplate-\u003elanguage = $locale;\n $objTemplate-\u003eid = $objCookie-\u003eid;\n $objTemplate-\u003etitle = $objCookie-\u003etitle;\n $objTemplate-\u003etype = $objCookie-\u003etype;\n $objTemplate-\u003eiframeType = $objCookie-\u003eiframeType;\n $objTemplate-\u003edescription = $objCookie-\u003eblockDescription;\n $objTemplate-\u003eredirect = $request-\u003eget(\u0027redirect\u0027);\n $objTemplate-\u003eacceptAndDisplayLabel = $this-\u003etranslator-\u003etrans(\u0027tl_cookiebar.acceptAndDisplayLabel\u0027, [], \u0027contao_default\u0027, $locale);\n\n return $objTemplate-\u003egetResponse();\n }\n```\n\n### Fix\nSanitize the `locale` input to prevent XSS payloads from being executed in a user\u0027s browser.\n\n\n### References\n- https://github.com/oveleon/contao-cookiebar/blob/2.x/src/Controller/CookiebarController.php\n- https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html\n\n\n### Timeline\n* **2024-04-24**: Vulnerability discovered by DR of usd AG.\n* **2024-07-25**: Probable cause of the vulnerability has been identified as Oveleon\u0027s Cookiebar Extension for Contao CMS.\n* **2024-07-25**: Vulnerability disclosed via GitHub Vulnerability Report.\n\n\n### Credits\nThis security vulnerability was identified by DR of usd AG.\n\n\n### About usd Security Advisories\nIn order to protect businesses against hackers and criminals, we always have to keep our skills and knowledge up to date. Thus, security research is just as important for our work as is building up a security community to promote the exchange of knowledge. After all, more security can only be achieved if many individuals take on the task.\n\nOur CST Academy and our usd HeroLab are essential parts of our security mission. We share the knowledge we gain in our practical work and our research through training courses and publications. In this context, the usd HeroLab publishes a series of papers on new vulnerabilities and current security issues. \n\nAlways for the sake of our mission: \"more security.\"\n\nhttps://www.usd.de\n\n\n### Disclaimer\nThe information provided in this security advisory is provided \"as is\" and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible.",
"id": "GHSA-296q-rj83-g9rq",
"modified": "2024-09-23T19:12:07Z",
"published": "2024-07-26T14:28:26Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/oveleon/contao-cookiebar/security/advisories/GHSA-296q-rj83-g9rq"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47069"
},
{
"type": "WEB",
"url": "https://github.com/oveleon/contao-cookiebar/commit/1d57470be5878f66d5e1e23f624dd387564b9b8d"
},
{
"type": "WEB",
"url": "https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html"
},
{
"type": "PACKAGE",
"url": "https://github.com/oveleon/contao-cookiebar"
},
{
"type": "WEB",
"url": "https://github.com/oveleon/contao-cookiebar/blob/2.x/src/Controller/CookiebarController.php"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Reflected Cross Site-Scripting (XSS) in Oveleon Cookiebar"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.