In all versions prior to Mautic 3.3.2, secret parameters such as database credentials could be exposed publicly by an authorized admin user through leveraging Symfony parameter syntax in any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0756 In all versions prior to Mautic 3.3.2, secret parameters such as database credentials could be exposed publicly by an authorized admin user through leveraging Symfony parameter syntax in any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application.
Github GHSA Github GHSA GHSA-4hjq-422q-4vpx Mautic vulnerable to secret data exfiltration via symfony parameters
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Mautic

Published:

Updated: 2024-09-16T16:23:48.079Z

Reserved: 2021-03-02T00:00:00

Link: CVE-2021-27908

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-23T20:15:13.310

Modified: 2024-11-21T05:58:45.650

Link: CVE-2021-27908

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.