Sylius is an open source eCommerce platform. Prior to versions 1.9.10, 1.10.11, and 1.11.2, it is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. A workaround is available. Every response from app should have an X-Frame-Options header set to: ``sameorigin``. To achieve that, add a new `subscriber` in the app.
References
Link | Resource |
---|---|
https://github.com/Sylius/Sylius/security/advisories/GHSA-4jp3-q2qm-9fmw | Mitigation Third Party Advisory |
https://github.com/Sylius/Sylius/releases/tag/v1.11.2 | Release Notes Third Party Advisory |
https://github.com/Sylius/Sylius/releases/tag/v1.9.10 | Release Notes Third Party Advisory |
https://github.com/Sylius/Sylius/releases/tag/v1.10.11 | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-03-14 12:15
Updated : 2022-03-22 10:32
NVD link : CVE-2022-24733
Mitre link : CVE-2022-24733
JSON object : View
CWE
CWE-1021
Improper Restriction of Rendered UI Layers or Frames
Products Affected
sylius
- sylius