Skip to content

auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped

High severity GitHub Reviewed Published Sep 10, 2024 in DamienHarper/auditor-bundle • Updated Sep 18, 2024

Package

composer damienharper/auditor-bundle (Composer)

Affected versions

< 5.2.6

Patched versions

5.2.6

Description

Summary

Unescaped entity property enables Javascript injection.

Details

I think this is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed.

PoC

Impact

persistent XSS. JS can be injected and executed.

References

Published to the GitHub Advisory Database Sep 10, 2024
Reviewed Sep 10, 2024
Published by the National Vulnerability Database Sep 10, 2024
Last updated Sep 18, 2024

Severity

High

EPSS score

0.052%
(22nd percentile)

Weaknesses

CVE ID

CVE-2024-45592

GHSA ID

GHSA-78vg-7v27-hj67

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.