CVE-2021-32737

Sulu is an open-source PHP content management system based on the Symfony framework. In versions of Sulu prior to 1.6.41, it is possible for a logged in admin user to add a script injection (cross-site-scripting) in the collection title. The problem is patched in version 1.6.41. As a workaround, one may manually patch the affected JavaScript files in lieu of updating.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*

History

09 Jul 2021, 14:37

Type Values Removed Values Added
CPE cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 4.8
CWE CWE-79
References (MISC) https://github.com/sulu/sulu/releases/tag/1.6.41 - (MISC) https://github.com/sulu/sulu/releases/tag/1.6.41 - Release Notes, Third Party Advisory
References (CONFIRM) https://github.com/sulu/sulu/security/advisories/GHSA-gm2x-6475-g9r8 - (CONFIRM) https://github.com/sulu/sulu/security/advisories/GHSA-gm2x-6475-g9r8 - Third Party Advisory

02 Jul 2021, 18:21

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-02 18:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-32737

Mitre link : CVE-2021-32737

CVE.ORG link : CVE-2021-32737


JSON object : View

Products Affected

sulu

  • sulu
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')