CVE-2024-28191

Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*
cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*

History

17 Jan 2025, 15:39

Type Values Removed Values Added
First Time Contao
Contao contao
References () https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator - () https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator - Vendor Advisory
References () https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919 - () https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919 - Patch
References () https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b - () https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b - Patch
References () https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8 - () https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8 - Vendor Advisory
CPE cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*

Information

Published : 2024-04-09 14:15

Updated : 2025-01-17 15:39


NVD link : CVE-2024-28191

Mitre link : CVE-2024-28191

CVE.ORG link : CVE-2024-28191


JSON object : View

Products Affected

contao

  • contao
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')