CVE-2024-45612

Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*
cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*
cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*

History

23 Sep 2024, 19:33

Type Values Removed Values Added
CPE cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*
CWE CWE-20 CWE-74
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Contao contao
Contao
References () https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls - () https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls - Vendor Advisory
References () https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj - () https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj - Vendor Advisory

17 Sep 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-17 19:15

Updated : 2024-09-23 19:33


NVD link : CVE-2024-45612

Mitre link : CVE-2024-45612


JSON object : View

Products Affected

contao

  • contao
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')