silverstripe/framework code execution vulnerability
High severity
GitHub Reviewed
Published
May 27, 2024
to the GitHub Advisory Database
Package
Affected versions
>= 4.0.3-rc1, < 4.0.4
>= 4.1.0-rc1, < 4.1.1
Patched versions
4.0.4
4.1.1
Description
Published to the GitHub Advisory Database
May 27, 2024
Reviewed
May 27, 2024
There is a vulnerability whereby arbitrary global functions may be executed if malicious user input is passed through to in the second argument of
ViewableData::renderWith
. This argument resolves associative arrays as template placeholders. This exploit requires that user code has been written which makes use of the second argument inrenderWith
and where user input is passed directly as a value in an associative array without sanitisation such asConvert::raw2xml()
.ViewableData::customise
is not vulnerable.References