Improper Access Control Affecting sulu/sulu package, versions >=2.2.0, <2.4.17>=2.5.0-alpha1, <2.5.13


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-SULUSULU-6371530
  • published5 Mar 2024
  • disclosed4 Mar 2024
  • creditUnknown

Introduced: 4 Mar 2024

CVE-2024-27915  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade sulu/sulu to version 2.4.17, 2.5.13 or higher.

Overview

sulu/sulu is a highly extensible open-source PHP content management system based on the Symfony framework.

Affected versions of this package are vulnerable to Improper Access Control. An attacker can gain unauthorized access to pages by exploiting the misconfiguration in role permissions for webspaces with a security system configured and permission check enabled.

Note:

This is only exploitable if the web space has a security system configured and permission check enabled.

Workaround

Remove the following lines from vendor/symfony/security-http/HttpUtils.php:

// Shortcut if request has already been matched before
if ($request->attributes->has('_route')) {
    return $path === $request->attributes->get('_route');
}

Or do not install symfony/security-http versions greater or equal than v5.4.30 or v6.3.6.

References

CVSS Scores

version 3.1