CVE-2024-28190

Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*
cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*

History

16 Jan 2025, 19:54

Type Values Removed Values Added
CPE cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*
First Time Contao
Contao contao
References () https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager - () https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager - Vendor Advisory
References () https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce - () https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce - Patch
References () https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d - () https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d - Patch
References () https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf - () https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf - Vendor Advisory

21 Nov 2024, 09:05

Type Values Removed Values Added
Summary
  • (es) Contao es un sistema de gestión de contenidos de código abierto. A partir de la versión 4.0.0 y antes de la versión 4.13.40 y 5.3.4, los usuarios pueden inyectar código malicioso en los nombres de archivos al cargar archivos (back-end y front-end), que luego se ejecuta en información sobre herramientas y ventanas emergentes en el back-end. Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, elimine los campos de carga de los formularios frontales y deshabilite las cargas para usuarios finales que no sean de confianza.
References () https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager - () https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager -
References () https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce - () https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce -
References () https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d - () https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d -
References () https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf - () https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf -

09 Apr 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-09 14:15

Updated : 2025-01-16 19:54


NVD link : CVE-2024-28190

Mitre link : CVE-2024-28190

CVE.ORG link : CVE-2024-28190


JSON object : View

Products Affected

contao

  • contao
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')