Cross-site Scripting (XSS) Affecting php-laravel-framework package, versions <6.20.14+dfsg-2+deb11u1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN11-PHPLARAVELFRAMEWORK-2316764
  • published13 Dec 2021
  • disclosed8 Dec 2021

Introduced: 8 Dec 2021

CVE-2021-43808  (opens in a new tab)
CWE-79  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade Debian:11 php-laravel-framework to version 6.20.14+dfsg-2+deb11u1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream php-laravel-framework package and not the php-laravel-framework package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Laravel is a web application framework. Laravel prior to versions 8.75.0, 7.30.6, and 6.20.42 contain a possible cross-site scripting (XSS) vulnerability in the Blade templating engine. A broken HTML element may be clicked and the user taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed. This vulnerability has been patched in versions 8.75.0, 7.30.6, and 6.20.42 by determining the parent placeholder at runtime and using a random hash that is unique to each request.

CVSS Scores

version 3.1