ghsa-pjpc-87mp-4332
Vulnerability from github
Published
2022-05-25 22:36
Modified
2022-05-25 22:36
Severity ?
Summary
Cross-site Scripting vulnerability in Mautic's tracking pixel functionality
Details
Impact
Mautic allows you to track open rates by using tracking pixels. The tracking information is stored together with extra metadata of the tracking request.
The output isn't sufficiently filtered when showing the metadata of the tracking information, which may lead to a vulnerable situation.
Patches
Please upgrade to 4.3.0
Workarounds
None.
References
- Internally tracked under MST-38
For more information
If you have any questions or comments about this advisory: * Email us at security@mautic.org
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "mautic/core" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.3.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-25772" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2022-05-25T22:36:33Z", "nvd_published_at": "2022-06-20T13:15:00Z", "severity": "CRITICAL" }, "details": "### Impact\n\nMautic allows you to track open rates by using tracking pixels. \nThe tracking information is stored together with extra metadata of the tracking request.\n\nThe output isn\u0027t sufficiently filtered when showing the metadata of the tracking information, which may lead to a vulnerable situation.\n\n### Patches\n\nPlease upgrade to 4.3.0\n\n### Workarounds\nNone.\n\n### References\n* Internally tracked under MST-38\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at [security@mautic.org](mailto:security@mautic.org)\n", "id": "GHSA-pjpc-87mp-4332", "modified": "2022-05-25T22:36:33Z", "published": "2022-05-25T22:36:33Z", "references": [ { "type": "WEB", "url": "https://github.com/mautic/mautic/security/advisories/GHSA-pjpc-87mp-4332" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25772" }, { "type": "WEB", "url": "https://github.com/mautic/mautic/commit/462eb596027fd949efbf9ac5cb2b376805e9d246" }, { "type": "PACKAGE", "url": "https://github.com/mautic/mautic" }, { "type": "WEB", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L", "type": "CVSS_V3" } ], "summary": "Cross-site Scripting vulnerability in Mautic\u0027s tracking pixel functionality" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.