GHSA-6QJF-7G3J-QX25
Vulnerability from github – Published: 2023-09-19 00:30 – Updated: 2024-01-16 17:08
VLAI?
Summary
Neos CMS Cross Site Scripting vulnerability
Details
Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allows a remote authenticated attacker to execute arbitrary code via a crafted SVG file uploaded to the neos/management/media component. To make use of this attack vector, the attacker must either be able to upload a maliciously crafted file or coerce someone with the needed access to upload said file to Neos. Even if such a file is uploaded and subsequently delivered, it is possible to use CSP to protect against attacks being executed from such a file.
Severity ?
5.4 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "neos/media-browser"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.3.19"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "neos/media-browser"
},
"ranges": [
{
"events": [
{
"introduced": "8.0.0"
},
{
"fixed": "8.0.16"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "neos/media-browser"
},
"ranges": [
{
"events": [
{
"introduced": "8.1.0"
},
{
"fixed": "8.1.11"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "neos/media-browser"
},
"ranges": [
{
"events": [
{
"introduced": "8.2.0"
},
{
"fixed": "8.2.11"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "neos/media-browser"
},
"ranges": [
{
"events": [
{
"introduced": "8.3.0"
},
{
"fixed": "8.3.9"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-37611"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2023-09-21T17:09:45Z",
"nvd_published_at": "2023-09-18T22:15:45Z",
"severity": "MODERATE"
},
"details": "Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allows a remote authenticated attacker to execute arbitrary code via a crafted SVG file uploaded to the `neos/management/media` component. To make use of this attack vector, the attacker must either be able to upload a maliciously crafted file or coerce someone with the needed access to upload said file to Neos. Even if such a file is uploaded and subsequently delivered, it is possible to use CSP to protect against attacks being executed from such a file.",
"id": "GHSA-6qjf-7g3j-qx25",
"modified": "2024-01-16T17:08:22Z",
"published": "2023-09-19T00:30:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37611"
},
{
"type": "WEB",
"url": "https://github.com/neos/neos-development-collection/issues/4833"
},
{
"type": "WEB",
"url": "https://github.com/neos/neos-development-collection/pull/4812"
},
{
"type": "WEB",
"url": "https://github.com/neos/neos-development-collection/commit/4ac0df04d2e44e164e95887b466075dde3f04045"
},
{
"type": "WEB",
"url": "https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html"
},
{
"type": "WEB",
"url": "https://digi.ninja/blog/svg_xss.php"
},
{
"type": "PACKAGE",
"url": "https://github.com/neos/neos-development-collection"
},
{
"type": "WEB",
"url": "https://github.com/neos/neos-ui/releases/tag/8.3.4"
},
{
"type": "WEB",
"url": "https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Neos CMS Cross Site Scripting vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…