Skip to main content

This site requires you to update your browser. Your browsing experience maybe affected by not having the most up to date version.

 

Silverstripe CMS security patches July 2024

We have released three security patches for Silverstripe CMS to address security vulnerabilities.

Read post

We have released three security patches for Silverstripe CMS to address security vulnerabilities. These vulnerabilities were reported to us following the documented process for reporting security issues, and we are not aware of any attempt to exploit them before the official disclosure today.

All of these vulnerabilities have a “medium” severity rating. These vulnerabilities are all present in both the 4.x and 5.x release lines of Silverstripe CMS, but are only patched in the 5.x release lines of Silverstripe CMS as per our major release policy.

See the release process documentation for more information about severity ratings.

CVE-2024-29885 - Reports are still accessible even when canView is set to false

The Report class has a canView() method. If that method is configured to return false the current user should not be able to view the report. While the report list will omit any canView false reports, those reports can still access them directly via the URL for that report, assuming the user has the CMS_ACCESS_ReportAdmin permission. After patching, the canView() permissions will be properly respected.

What does this mean for me?

You will only be affected by this vulnerability if:

  • your project has any reports that implement a canView() method to restrict access.

Upgrade the silverstripe/reports module to 5.2.3 to remedy this vulnerability.

Read the CVE-2024-29885 security advisory for the technical details of this vulnerability.

CVE-2024-32981 - XSS Vulnerability with text/html base64-encoded payload

A specially crafted XSS payload could be inserted into a field in the CMS when logged in as a CMS user with regular permissions. This XSS could be executed either in the CMS or on the front-end of the website.

What does this mean for me?

Upgrade the silverstripe/framework module to 5.2.16 to remedy this vulnerability.

Read the CVE-2024-32981 security advisory for the technical details of this vulnerability.

SS-2024-001 - TinyMCE allows svg files linked in object tags

TinyMCE v6 has a configuration value convert_unsafe_embeds set to false which allows SVG files containing JavaScript to be saved which can be used as a vector for XSS attacks.

After patching the default value of convert_unsafe_embeds will be set to true. This means that <object> tags will be converted to <iframe> tags instead the next time the page is saved, which may break any pages that rely upon previously saved object tags. Users are to override this config if desired so that <object> tags are again used instead of <iframe> tags. Note that <embed> tags are not allowed by default.

This vulnerability was described by TinyMCE as follows:

A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content loading and content inserting code. A SVG image could be loaded through an object or embed element and that image could potentially contain a XSS payload.

What does this mean for me?

You will only be affected by this vulnerability if:

  • Content authors use the <object> in TinyMCE and there is some logic that relies on an <object> tag being output

Upgrade the silverstripe/framework module to 5.2.16 to remedy this vulnerability.

Read the SS-2024-001 security advisory for the technical details of this vulnerability.

Security patch release windows

In August 2023 we adopted a minor release policy, which complements the major release policy we adopted in September 2022. The minor release policy includes release windows for security patches such as this one.

Read the minor release policy for more information about security patch release windows.

About the author
Steve Boyd

Steve is a Principal Product Developer in the CMS Squad.

Post your comment

Comments

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments