Filtered by vendor Silverstripe
Subscribe
Total
79 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-28104 | 1 Silverstripe | 1 Graphql | 2023-03-22 | N/A | 7.5 HIGH |
`silverstripe/graphql` serves Silverstripe data as GraphQL representations. In versions 4.2.2 and 4.1.1, an attacker could use a specially crafted graphql query to execute a denial of service attack against a website which has a publicly exposed graphql endpoint. This mostly affects websites with particularly large/complex graphql schemas. Users should upgrade to `silverstripe/graphql` 4.2.3 or 4.1.2 to remedy the vulnerability. | |||||
CVE-2022-42949 | 1 Silverstripe | 1 Subsites | 2023-01-03 | N/A | 7.5 HIGH |
Silverstripe silverstripe/subsites through 2.6.0 has Insecure Permissions. | |||||
CVE-2022-37429 | 1 Silverstripe | 1 Framework | 2022-12-02 | N/A | 5.4 MEDIUM |
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 2) via JavaScript payload to the href attribute of a link by splitting a javascript URL with white space characters. | |||||
CVE-2022-38147 | 1 Silverstripe | 1 Framework | 2022-11-30 | N/A | 5.4 MEDIUM |
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 3 of 3). | |||||
CVE-2022-37421 | 1 Silverstripe | 1 Silverstripe | 2022-11-30 | N/A | 5.4 MEDIUM |
Silverstripe silverstripe/cms through 4.11.0 allows XSS. | |||||
CVE-2022-38145 | 1 Silverstripe | 1 Framework | 2022-11-30 | N/A | 5.4 MEDIUM |
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 3) via remote attackers adding a Javascript payload to a page's meta description and get it executed in the versioned history compare view. | |||||
CVE-2022-37430 | 1 Silverstripe | 1 Framework | 2022-11-30 | N/A | 5.4 MEDIUM |
Silverstripe silverstripe/framework through 4.11 allows XSS vulnerability via href attribute of a link (issue 2 of 2). | |||||
CVE-2022-38724 | 1 Silverstripe | 3 Asset Admin, Assets, Framework | 2022-11-28 | N/A | 5.4 MEDIUM |
Silverstripe silverstripe/framework through 4.11.0, silverstripe/assets through 1.11.0, and silverstripe/asset-admin through 1.11.0 allow XSS. | |||||
CVE-2022-38462 | 1 Silverstripe | 1 Framework | 2022-11-23 | N/A | 6.1 MEDIUM |
Silverstripe silverstripe/framework through 4.11 is vulnerable to XSS by carefully crafting a return URL on a /dev/build or /Security/login request. | |||||
CVE-2022-38146 | 1 Silverstripe | 1 Framework | 2022-11-21 | N/A | 5.4 MEDIUM |
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 2 of 3). | |||||
CVE-2022-38148 | 1 Silverstripe | 1 Framework | 2022-11-21 | N/A | 8.8 HIGH |
Silverstripe silverstripe/framework through 4.11 allows SQL Injection. | |||||
CVE-2022-24444 | 1 Silverstripe | 1 Silverstripe | 2022-07-13 | 6.4 MEDIUM | 6.5 MEDIUM |
Silverstripe silverstripe/framework through 4.10 allows Session Fixation. | |||||
CVE-2022-28803 | 1 Silverstripe | 1 Silverstripe | 2022-07-08 | 3.5 LOW | 5.4 MEDIUM |
In SilverStripe Framework through 2022-04-07, Stored XSS can occur in javascript link tags added via XMLHttpRequest (XHR). | |||||
CVE-2022-29858 | 1 Silverstripe | 1 Assets | 2022-07-07 | 4.0 MEDIUM | 4.3 MEDIUM |
Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content. | |||||
CVE-2022-25238 | 1 Silverstripe | 1 Framework | 2022-07-07 | 3.5 LOW | 5.4 MEDIUM |
Silverstripe silverstripe/framework through 4.10.0 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code. | |||||
CVE-2021-41559 | 1 Silverstripe | 1 Silverstripe | 2022-07-07 | 4.3 MEDIUM | 6.5 MEDIUM |
Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document. | |||||
CVE-2022-29254 | 1 Silverstripe | 1 Silverstripe-omnipay | 2022-06-17 | 5.8 MEDIUM | 6.5 MEDIUM |
silverstripe-omnipay is a SilverStripe integration with Omnipay PHP payments library. For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some issuing banks offer flawed 3DSecure implementations that may inadvertently expose this data. The following versions have been patched to fix this issue: `2.5.2`, `3.0.2`, `3.1.4`, and `3.2.1`. There are no known workarounds for this vulnerability. | |||||
CVE-2021-28661 | 1 Silverstripe | 1 Silverstripe | 2021-10-14 | 4.0 MEDIUM | 4.3 MEDIUM |
Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass. | |||||
CVE-2021-36150 | 1 Silverstripe | 1 Silverstripe | 2021-10-14 | 4.3 MEDIUM | 6.1 MEDIUM |
SilverStripe Framework through 4.8.1 allows XSS. | |||||
CVE-2019-16409 | 2 Silverstripe, Symbiote | 2 Silverstripe, Versionedfiles | 2021-07-21 | 5.0 MEDIUM | 5.3 MEDIUM |
In the Versioned Files module through 2.0.3 for SilverStripe 3.x, unpublished versions of files are publicly exposed to anyone who can guess their URL. This guess could be highly informed by a basic understanding of the symbiote/silverstripe-versionedfiles source code. (Users who upgrade from SilverStripe 3.x to 4.x and had Versioned Files installed have no further need for this module, because the 4.x release has built-in versioning. However, nothing in the upgrade process automates the destruction of these insecure artefacts, nor alerts the user to the criticality of destruction.) |