Skip to content

Cross-Site Scripting in Grav

Moderate severity GitHub Reviewed Published Dec 10, 2020 in getgrav/grav • Updated Jan 9, 2023

Package

composer getgrav/grav (Composer)

Affected versions

< 1.6.30

Patched versions

1.6.30

Description

Impact

Privileged users (with the ability to edit pages) have a mechanism to perform remote code execution via XSS. At a minimum, the vulnerability represents a bypass of security controls put in place to mitigate this form of attack.

The remote code execution can be performed because XSS would allow an attacker to execute functionality on behalf of a stolen administrative account - the facility to install custom plugins would then allow said attacker to install a plugin containing a web shell and thus garner access to the underlying system.

References

https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)
https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
https://cwe.mitre.org/data/definitions/79.html

For more information

Please contact [email protected]

References

@rhukster rhukster published to getgrav/grav Dec 10, 2020
Reviewed Dec 10, 2020
Published to the GitHub Advisory Database Dec 10, 2020
Last updated Jan 9, 2023

Severity

Moderate

EPSS score

Weaknesses

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Learn more on MITRE.

CVE ID

No known CVE

GHSA ID

GHSA-cvmr-6428-87w9

Source code

No known source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.