PHP file inclusion in the Sulu admin panel
Package
Affected versions
< 1.6.44
>= 2.0.0, < 2.2.18
>= 2.3.0, < 2.3.8
= 2.4.0-RC1
Patched versions
1.6.44
2.2.18
2.3.8
2.4.0
Description
Published by the National Vulnerability Database
Dec 15, 2021
Reviewed
Dec 15, 2021
Published to the GitHub Advisory Database
Dec 15, 2021
Last updated
Feb 1, 2023
Impact
What kind of vulnerability is it? Who is impacted?
An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.
Patches
Has the problem been patched? What versions should users upgrade to?
The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
Overwrite the service
sulu_route.generator.expression_token_provider
and wrap the translator before passing it to the expression language.References
Are there any links users can visit to find out more?
Currently not.
For more information
If you have any questions or comments about this advisory:
References