Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-19745 CVE-2019-19712 |
CWE-ID | CWE-434 CWE-276 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Contao Web applications / CMS |
Vendor | Contao |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU34959
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-19745
CWE-ID:
CWE-434 - Unrestricted Upload of File with Dangerous Type
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated user to execute arbitrary code.
Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server.
MitigationInstall update from vendor's website.
Vulnerable software versionsContao: 4.0 - 4.7
External linkshttp://contao.org/en/news.html
http://contao.org/en/security-advisories/unrestricted-file-uploads.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU34960
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-19712
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Contao 4.0 through 4.8.5 has Insecure Permissions. Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them.
MitigationInstall update from vendor's website.
Vulnerable software versionsContao: 4.0 - 4.7
External linkshttp://contao.org/en/news.html
http://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.