GHSA-5vv7-j593-mgjc

Suggest an improvement
Source
https://github.com/advisories/GHSA-5vv7-j593-mgjc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-5vv7-j593-mgjc/GHSA-5vv7-j593-mgjc.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-5vv7-j593-mgjc
Published
2024-05-17T22:54:42Z
Modified
2024-12-02T05:39:48.069871Z
Summary
Neos Flow Arbitrary file upload and XML External Entity processing
Details

It has been discovered that Flow 3.0.0 allows arbitrary file uploads, inlcuding server-side scripts, posing the risk of attacks. If those scripts are executed by the server when accessed through their public URL, anything not blocked through other means is possible (information disclosure, placement of backdoors, data removal, …).

Note: The upload of files is only possible if the application built on Flow provides means to do so, and whether or not the upload of files poses a risk is dependent on the system setup. If uploaded script files are not executed by the server, there is no risk. In versions prior to 3.0.0 the upload of files with the extension php was blocked.

In Flow 2.3.0 to 2.3.6 a potential XML External Entity processing vulnerability has been discovered in the MediaTypeConverter.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-05-17T22:54:42Z"
}
References

Affected packages

Packagist / neos/flow

Package

Name
neos/flow
Purl
pkg:composer/neos/flow

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.3.0
Fixed
2.3.7

Affected versions

2.*

2.3.0
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6

Packagist / neos/flow

Package

Name
neos/flow
Purl
pkg:composer/neos/flow

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.0.0
Fixed
3.0.1

Affected versions

3.*

3.0.0