Information Exposure Affecting mautic/core package, versions <2.13.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-MAUTICCORE-1062735
  • published20 Jan 2021
  • disclosed19 Jan 2021
  • creditUnknown

Introduced: 19 Jan 2021

CVE-2018-10189  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade mautic/core to version 2.13.0 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled.

References

CVSS Scores

version 3.1