ghsa-mj6m-246h-9w56
Vulnerability from github
Published
2022-03-01 22:05
Modified
2022-03-01 22:05
Summary
Improper regex in htaccess file
Details
Impact
the default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application.
This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path.
Patches
Please upgrade to 3.3.5 or 4.2.0
Workarounds
No
References
- Release post: https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic
- Internally tracked under MST-32
For more information
If you have any questions or comments about this advisory: * Email us at security@mautic.org
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "mautic/core" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.3.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "mautic/core" }, "ranges": [ { "events": [ { "introduced": "4.0.0" }, { "fixed": "4.2.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-25769" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2022-03-01T22:05:34Z", "nvd_published_at": null, "severity": "MODERATE" }, "details": "### Impact\nthe default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application.\n\nThis logic isn\u0027t correct, as the regex in the second FilesMatch only checks the filename, not the full path.\n\n### Patches\nPlease upgrade to 3.3.5 or 4.2.0 \n\n### Workarounds\nNo\n\n### References\n\n- Release post: https://www.mautic.org/blog/community/mautic-4-2-one-small-step-mautic\n- Internally tracked under MST-32\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at [security@mautic.org](mailto:security@mautic.org)\n", "id": "GHSA-mj6m-246h-9w56", "modified": "2022-03-01T22:05:34Z", "published": "2022-03-01T22:05:34Z", "references": [ { "type": "WEB", "url": "https://github.com/mautic/mautic/security/advisories/GHSA-mj6m-246h-9w56" } ], "schema_version": "1.4.0", "severity": [], "summary": "Improper regex in htaccess file" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.