First published: Wed Aug 11 2021(Updated: )
### Impact It is possible for untrusted users to inject malicious code into HTML attributes in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights to modify HTML fields (e.g. TinyMCE). ### Patches Update to Contao 4.4.56, 4.9.18 or 4.11.7 ### Workarounds Disable all fields that allow HTML for untrusted back end users or disable the login for these users. ### References https://contao.org/en/security-advisories/cross-site-scripting-via-html-attributes-in-the-back-end ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). ### Credits Thanks to Mikhail Khramenkov and Moritz Vondano for reporting this security issue.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/contao/core-bundle | >=4.0.0<4.4.56>=4.5.0<4.6.0>=4.6.0<4.7.0>=4.7.0<4.8.0>=4.8.0<4.9.0>=4.9.0<4.9.18>=4.10.0<4.11.0>=4.11.0<4.11.7 | |
composer/contao/contao | >=4.0.0<4.4.56>=4.5.0<4.6.0>=4.6.0<4.7.0>=4.7.0<4.8.0>=4.8.0<4.9.0>=4.9.0<4.9.18>=4.10.0<4.11.0>=4.11.0<4.11.7 | |
Contao Contao | >=4.0.0<4.4.56 | |
Contao Contao | >=4.5.0<4.9.18 | |
Contao Contao | >=4.10.0<4.11.7 | |
composer/contao/core-bundle | >=4.10.0<4.11.7 | 4.11.7 |
composer/contao/core-bundle | >=4.5.0<4.9.18 | 4.9.18 |
composer/contao/contao | >=4.10.0<4.11.7 | 4.11.7 |
composer/contao/contao | >=4.5.0<4.9.18 | 4.9.18 |
composer/contao/contao | >=4.0.0<4.4.56 | 4.4.56 |
composer/contao/core-bundle | >=4.0.0<4.4.56 | 4.4.56 |
>=4.0.0<4.4.56 | ||
>=4.5.0<4.9.18 | ||
>=4.10.0<4.11.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.