CVE-2024-28190:
Contao: Cross site scripting in the file manager
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.72463%
CWE
Published
4/9/2024
Updated
4/9/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
contao/core-bundle | composer | >= 4.0.0, < 4.13.40 | 4.13.40 |
contao/core-bundle | composer | >= 5.0.0-RC1, < 5.3.4 | 5.3.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from three key points:
- In DC_Folder.php, StringUtil::specialchars() was missing the critical third parameter (encodeInsertTags=true) to encode double quotes in filenames, leaving HTML attributes vulnerable to injection.
- In core.js, modal title properties (opt.title) were directly interpolated into HTML without escaping &, <, ", and ' characters, enabling script execution.
- In tips.js, the tooltip text extraction from 'title' attributes lacked encoding for special characters. The patches explicitly add replace() chains and parameter adjustments to these exact locations, confirming these were the vulnerable points.