auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to version 5.2.6, there is an unescaped entity property enabling Javascript injection. This is possible because `%source_label%` in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in versions 6.0.0 and 5.2.6.
History

Wed, 18 Sep 2024 19:45:00 +0000

Type Values Removed Values Added
Description auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to 6.0.0, there is an unescaped entity property enabling Javascript injection. This is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in 6.0.0. auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to version 5.2.6, there is an unescaped entity property enabling Javascript injection. This is possible because `%source_label%` in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in versions 6.0.0 and 5.2.6.
References

Tue, 10 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Damienharper
Damienharper auditor-bundle
CPEs cpe:2.3:a:damienharper:auditor-bundle:*:*:*:*:*:*:*:*
Vendors & Products Damienharper
Damienharper auditor-bundle
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Sep 2024 16:15:00 +0000

Type Values Removed Values Added
Description auditor-bundle, formerly known as DoctrineAuditBundle, integrates auditor library into any Symfony 3.4+ application. Prior to 6.0.0, there is an unescaped entity property enabling Javascript injection. This is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed. The vulnerability is fixed in 6.0.0.
Title auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-10T16:00:14.887Z

Updated: 2024-09-18T19:38:07.690Z

Reserved: 2024-09-02T16:00:02.422Z

Link: CVE-2024-45592

cve-icon Vulnrichment

Updated: 2024-09-10T19:22:19.111Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-10T16:15:21.550

Modified: 2024-09-18T20:15:03.483

Link: CVE-2024-45592

cve-icon Redhat

No data.