Skip to content

Cross-Site Scripting in Grav

Moderate severity GitHub Reviewed Published Dec 10, 2020 in getgrav/grav • Updated Jan 9, 2023

Package

composer getgrav/grav (Composer)

Affected versions

< 1.6.30

Patched versions

1.6.30

Description

Impact

Privileged users (with the ability to edit pages) have a mechanism to perform remote code execution via XSS. At a minimum, the vulnerability represents a bypass of security controls put in place to mitigate this form of attack.

The remote code execution can be performed because XSS would allow an attacker to execute functionality on behalf of a stolen administrative account - the facility to install custom plugins would then allow said attacker to install a plugin containing a web shell and thus garner access to the underlying system.

References

https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)
https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
https://cwe.mitre.org/data/definitions/79.html

For more information

Please contact contact@pentest.co.uk

References

@rhukster rhukster published to getgrav/grav Dec 10, 2020
Reviewed Dec 10, 2020
Published to the GitHub Advisory Database Dec 10, 2020
Last updated Jan 9, 2023

Severity

Moderate

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-cvmr-6428-87w9

Source code

No known source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.