We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-45592

auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped



Description

auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to version 5.2.6, there is an unescaped entity property enabling Javascript injection. This is possible because `%source_label%` in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in versions 6.0.0 and 5.2.6.

Reserved 2024-09-02 | Published 2024-09-10 | Updated 2024-09-20 | Assigner GitHub_M


HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

Product status

< 5.2.6
affected

References

github.com/DamienHarper/auditor-bundle/security/advisories/GHSA-78vg-7v27-hj67

github.com/...per/auditor-bundle/commit/42ba2940d8b99467de0c806ea5655cc1c6882cd1

github.com/...per/auditor-bundle/commit/e7deb377fa89677d44973b486d26d6a7374233ae

cve.org (CVE-2024-45592)

nvd.nist.gov (CVE-2024-45592)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-45592

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.