Vulnerability Details : CVE-2023-22729
Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, an attacker can display a link to a third party website on a login screen by convincing a legitimate content author to follow a specially crafted link. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue.
Vulnerability category: Open redirect
Products affected by CVE-2023-22729
- cpe:2.3:a:silverstripe:framework:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22729
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22729
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N |
2.8
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2023-22729
-
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-22729
-
https://github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-fw84-xgm8-9jmv
Open redirect vulnerability on CMSSecurity relogin screen · Advisory · silverstripe/silverstripe-framework · GitHubVendor Advisory
-
https://github.com/silverstripe/silverstripe-framework/commit/1a5bb4cbece1721203977910b8ecd8b79c18dc77
[CVE-2023-22729] Escaped double slash is absolute URL · silverstripe/silverstripe-framework@1a5bb4c · GitHubPatch
Jump to