SilverStripe 4.5.0 Release Candidate 1

CPE Details

SilverStripe 4.5.0 Release Candidate 1
4.5.0
2020-02-21
19h20 +00:00
2020-02-21
19h20 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:silverstripe:silverstripe:4.5.0:rc1:*:*:*:*:*:*

Informations

Vendor

silverstripe

Product

silverstripe

Version

4.5.0

Update

rc1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-37421 2022-11-22 23h00 +00:00 Silverstripe silverstripe/cms through 4.11.0 allows XSS.
5.4
Medium
CVE-2022-28803 2022-06-28 22h50 +00:00 In SilverStripe Framework through 2022-04-07, Stored XSS can occur in javascript link tags added via XMLHttpRequest (XHR).
5.4
Medium
CVE-2021-41559 2022-06-28 19h27 +00:00 Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.
6.5
Medium
CVE-2021-36150 2021-10-07 11h59 +00:00 SilverStripe Framework through 4.8.1 allows XSS.
6.1
Medium
CVE-2020-26136 2021-06-08 17h37 +00:00 In SilverStripe through 4.6.0-rc1, GraphQL doesn't honour MFA (multi-factor authentication) when using basic authentication.
6.5
Medium
CVE-2020-25817 2021-06-08 15h54 +00:00 SilverStripe through 4.6.0-rc1 has an XXE Vulnerability in CSSContentParser. A developer utility meant for parsing HTML within unit tests can be vulnerable to XML External Entity (XXE) attacks. When this developer utility is misused for purposes involving external or user submitted data in custom project code, it can lead to vulnerabilities such as XSS on HTML output rendered through this custom code. This is now mitigated by disabling external entities during parsing. (The correct CVE ID year is 2020 [CVE-2020-25817, not CVE-2021-25817]).
4.8
Medium
CVE-2020-26138 2021-06-08 15h35 +00:00 In SilverStripe through 4.6.0-rc1, a FormField with square brackets in the field name skips validation.
5.3
Medium
CVE-2020-6164 2020-07-15 18h32 +00:00 In SilverStripe through 4.5.0, a specific URL path configured by default through the silverstripe/framework module can be used to disclose the fact that a domain is hosting a Silverstripe application. There is no disclosure of the specific version. The functionality on this URL path is limited to execution in a CLI context, and is not known to present a vulnerability through web-based access. As a side-effect, this preconfigured path also blocks the creation of other resources on this path (e.g. a page).
7.5
High
CVE-2020-6165 2020-07-15 18h27 +00:00 SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does not allow unauthorised changing of records.
5.3
Medium
CVE-2019-19326 2020-07-15 16h54 +00:00 Silverstripe CMS sites through 4.4.4 which have opted into HTTP Cache Headers on responses served by the framework's HTTP layer can be vulnerable to web cache poisoning. Through modifying the X-Original-Url and X-HTTP-Method-Override headers, responses with malicious HTTP headers can return unexpected responses to other consumers of this cached response. Most other headers associated with web cache poisoning are already disabled through request hostname forgery whitelists.
5.9
Medium
CVE-2020-9280 2020-04-15 18h18 +00:00 In SilverStripe through 4.5, files uploaded via Forms to folders migrated from Silverstripe CMS 3.x may be put to the default "/Uploads" folder instead. This affects installations which allowed upload folder protection via the optional silverstripe/secureassets module under 3.x. This module is installed and enabled by default on the Common Web Platform (CWP). The vulnerability only affects files uploaded after an upgrade to 4.x.
7.5
High
CVE-2019-19325 2020-02-17 18h59 +00:00 SilverStripe through 4.4.x before 4.4.5 and 4.5.x before 4.5.2 allows Reflected XSS on the login form and custom forms. Silverstripe Forms allow malicious HTML or JavaScript to be inserted through non-scalar FormField attributes, which allows performing XSS (Cross-Site Scripting) on some forms built with user input (Request data). This can lead to phishing attempts to obtain a user's credentials or other sensitive user input.
6.1
Medium