You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Contao Insert tag injection in forms
Moderate severity
GitHub Reviewed
Published
Sep 24, 2020
in
contao/contao
•
Updated Apr 22, 2024
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Learn more on MITRE.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Learn more on MITRE.
Impact
It is possible to inject insert tags in front end forms which will be replaced when the page is rendered.
Patches
Update to Contao 4.4.52, 4.9.6 or 4.10.1.
Workarounds
Disable the front end login form and do not use form fields with array keys such as
fieldname[]
.References
https://contao.org/en/security-advisories/insert-tag-injection-in-forms
For more information
If you have any questions or comments about this advisory, open an issue in contao/contao.
References