Information Exposure

Affecting mautic/core package, versions <3.3.2

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

Affected versions of this package are vulnerable to Information Exposure. Secret parameters such as database credentials could be exposed publicly by an authorized admin user through leveraging Symfony parameter syntax in any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application.

Remediation

Upgrade mautic/core to version 3.3.2 or higher.

References

CVSS Score

5.8
medium severity
  • Attack Vector
    Local
  • Attack Complexity
    High
  • Privileges Required
    High
  • User Interaction
    Required
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    Low
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
Credit
Petr Gregor, Miroslav Fedeleš
CVE
CVE-2021-27908
CWE
CWE-200
Snyk ID
SNYK-PHP-MAUTICCORE-1088511
Disclosed
24 Mar, 2021
Published
24 Mar, 2021