First published: Thu Jan 14 2021(Updated: )
### Impact This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic. This vulnerability was reported by Naveen Sunkavally at Horizon3.ai. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | >=3.2.0<3.2.4>=3.1.0<3.2.0>=3.0.0<3.1.0>=2.0.0<2.16.5 | |
Acquia Mautic | <3.2.4 | |
composer/mautic/core | >=2.0.0<2.16.5 | 2.16.5 |
composer/mautic/core | >=3.0.0<3.2.4 | 3.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35124 is a highly critical cross-site scripting (XSS) vulnerability in the assets component of Mautic before version 3.2.4.
The severity of CVE-2020-35124 is rated as critical with a score of 9.6.
CVE-2020-35124 allows remote attackers to inject executable JavaScript through the Referer header of asset downloads in Mautic.
Mautic versions 2.0.0 to 2.16.5, and versions 3.0.0 to 3.2.0 are affected by CVE-2020-35124.
To fix CVE-2020-35124, upgrade Mautic to version 3.2.4 or later.