An issue was discovered in Sylius products. Missing input sanitization in sylius/sylius 1.0.x through 1.0.18, 1.1.x through 1.1.17, 1.2.x through 1.2.16, 1.3.x through 1.3.11, and 1.4.x through 1.4.3 and sylius/grid 1.0.x through 1.0.18, 1.1.x through 1.1.18, 1.2.x through 1.2.17, 1.3.x through 1.3.12, 1.4.x through 1.4.4, and 1.5.0 allows an attacker (an admin in the sylius/sylius case) to perform XSS by injecting malicious code into a field displayed in a grid with the "string" field type. The contents are an object, with malicious code returned by the __toString() method of that object.
References
Link | Resource |
---|---|
https://sylius.com/blog/cve-2019-12186/ | Vendor Advisory |
https://sylius.com/blog/cve-2019-12186/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://sylius.com/blog/cve-2019-12186/ - Vendor Advisory |
Information
Published : 2019-12-31 15:15
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12186
Mitre link : CVE-2019-12186
CVE.ORG link : CVE-2019-12186
JSON object : View
Products Affected
sylius
- grid
- sylius
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')