Contao affected by remote command execution through file upload
Back end users with access to the file manager can upload malicious files and execute them on the server.
Back end users with access to the file manager can upload malicious files and execute them on the server.
It is possible to inject insert tags in canonical URLs which will be replaced when the page is rendered.
Back end users can list files outside their file mounts or the document root in the FileSelector widget.
It is possible to inject insert tags via the form generator if the submitted form data is output on the page in a specific way.
When a front end member changes their password, the corresponding remember-me tokens are not removed.
If the crawler is set to crawl protected pages, it sends the cookie header to externals URLs.
Users can insert malicious code into file names when uploading files, which is then executed in tooltips and popups in the backend.
Contao is an open source content management system. Starting in version 4.0.0 and prior to versions 4.9.42, 4.13.28, and 5.1.10, it is possible for untrusted backend users to inject malicious code into headline fields in the back end, which will be executed both in the element preview (back end) and on the website (front end). Installations are only affected if there are untrusted back end users who have the rights …
Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds.
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.
Cross-site Scripting (XSS) in GitHub repository contao/contao prior to 4.13.3. Attacker can execute Malicious JS in Application :)
Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.
Contao
Contao is an open source CMS that allows creation of websites and scalable web applications.All users are advised to update to Contao As a workaround users may disable the form generator or disable the login for untrusted back end users.
Contao is an open source CMS that allows you to create websites and scalable web applications.Update to Contao to resolve. If you cannot update then disable the login for untrusted back end users.
It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
Contao suffers from an Improper Input Validation flaw. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered.
Contao is vulnerable to XSS when viewing the system log. An unauthenticated attacker can inject a script which is executed when a logged-in backend user views the system log.
contao has a sql injection vulnerability
Contao allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server.
Contao has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them.
Contao has Improper Encoding or Escaping of Output. It is possible to inject insert tags into the login module which will be replaced when the page is rendered.
Contao allows SQL Injection.
Both the search filter in the back end and the "listing" module in the front end are vulnerable to SQL injection. To exploit the vulnerability in the back end, a back end user has to be logged in, whereas the front end vulnerability can be exploited by anyone.
Contao has a Weak Password Recovery Mechanism for a Forgotten Password.
Contao allows Use of a Key Past its Expiration Date.
Contao has Incorrect Access Control.
Contao allows CSRF.
A logged in back end user can include arbitrary PHP files by manipulating an URL parameter. Since Contao does not allow to upload PHP files in the file manager, the attack is limited to the existing PHP files on the server.