Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. silverstripe/framework
  4. ›
  5. GHSA-f43j-8hq4-2xj9

GHSA-f43j-8hq4-2xj9: silverstripe/framework uploaded PHP script execution in assets

May 27, 2024

A weakness in the .htaccess rules preventing requests to uploaded PHP scripts allows PHP scripts that had made their way into the assets directory to be successfully executed through the use of a specially crafted URL. There are protections in place to disallow upload of PHP scripts through the CMS, meaning this weakness does not lead to direct vulnerabilities.

In addition, sites hosted on the New Zealand Common Web Platform or SilverStripe Platform have additional configuration in place which prevents PHP script execution in assets, even in a malicious party manages to upload these into the folder.

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/SS-2018-012-1.yaml
  • github.com/advisories/GHSA-f43j-8hq4-2xj9
  • github.com/silverstripe/silverstripe-framework
  • github.com/silverstripe/silverstripe-framework/commit/5b7eca2b6327556e2d5ad31bb00511b187e5992a
  • www.silverstripe.org/download/security-releases/ss-2018-012

Code Behaviors & Features

Detect and mitigate GHSA-f43j-8hq4-2xj9 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.0.0-rc1 before 4.0.4, all versions starting from 4.1.0-rc1 before 4.1.1

Fixed versions

  • 4.0.4
  • 4.1.1

Solution

Upgrade to versions 4.0.4, 4.1.1 or above.

Weakness

  • CWE-20: Improper Input Validation

Source file

packagist/silverstripe/framework/GHSA-f43j-8hq4-2xj9.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 13 May 2025 00:14:42 +0000.