GHSA-78vg-7v27-hj67

Suggest an improvement
Source
https://github.com/advisories/GHSA-78vg-7v27-hj67
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-78vg-7v27-hj67/GHSA-78vg-7v27-hj67.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-78vg-7v27-hj67
Aliases
Published
2024-09-10T15:53:10Z
Modified
2024-09-18T19:45:57.312291Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L CVSS Calculator
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L CVSS Calculator
Summary
auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped
Details

Summary

Unescaped entity property enables Javascript injection.

Details

I think this is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed.

PoC

  • clone example project https://github.com/DamienHarper/auditor-bundle-demo
  • create author with FullName <script>alert()</script>
  • delete author
  • view audit of authors
  • alert is displayed

Impact

persistent XSS. JS can be injected and executed.

References

Affected packages

Packagist / damienharper/auditor-bundle

Package

Name
damienharper/auditor-bundle
Purl
pkg:composer/damienharper/auditor-bundle

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.2.6

Affected versions

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.0.10
1.0.11
1.1.0
1.2.0
1.2.1
1.2.2
1.3.0
1.4.0
1.5.0
1.5.1
1.6.0

2.*

2.0.0
2.1.0
2.2.0
2.3.0
2.3.1
2.3.2
2.4.0
2.5.0

3.*

3.0.0
3.1.0
3.2.0
3.2.1
3.2.2
3.2.3
3.3.0
3.3.1
3.3.2
3.4.0
3.4.1
3.4.2

4.*

4.0.0
4.0.1
4.0.2
4.0.3
4.0.4
4.1.0
4.2.0

5.*

5.0.0
5.0.1
5.0.2
5.0.3
5.1.0
5.1.1
5.2.0
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5