First published: Sun Nov 21 2021(Updated: )
An attacker could inject a XSS payload in a Silverstripe CMS response by carefully crafting a return URL on a /dev/build or /Security/login request. To exploit this vulnerability, an attacker would need to convince a user to follow a link with a malicious payload. This will only affect projects configured to output PHP warnings to the browser. By default, Silverstripe CMS will only output PHP warnings if your SS_ENVIRONMENT_TYPE environment variable is set to dev. Production sites should always set SS_ENVIRONMENT_TYPE to live.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/silverstripe/framework | >=4.0.0<4.11.13 | |
Silverstripe Framework | <4.11.13 | |
Silverstripe Framework | >=3.0.0<=3.7.7 | |
composer/silverstripe/framework | >=4.0.0<4.11.13 | 4.11.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38462 is a vulnerability that allows for reflected cross-site scripting (XSS) attacks through querystring parameters.
The severity of CVE-2022-38462 depends on the specific implementation and context, but reflected XSS vulnerabilities can potentially lead to theft of sensitive information, unauthorized actions, and other security risks.
CVE-2022-38462 allows an attacker to inject and execute malicious scripts in a web application through URL querystring parameters, leading to potential cross-site scripting attacks.
To fix CVE-2022-38462, it is recommended to update the affected software to a version that includes a security patch. In this case, updating Silverstripe framework to a version above 4.11.13 will address the vulnerability.
You can find more information about CVE-2022-38462 on the official Silverstripe website at the following link: [https://www.silverstripe.org/download/security-releases/cve-2022-38462](https://www.silverstripe.org/download/security-releases/cve-2022-38462)