Description
Sylius is an open source eCommerce platform. Prior to versions 1.9.10, 1.10.11, and 1.11.2, it is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker. The issue is fixed in versions 1.9.10, 1.10.11, and 1.11.2. A workaround is available. Every response from app should have an X-Frame-Options header set to: ``sameorigin``. To achieve that, add a new `subscriber` in the app.
Related CPE's
a
sylius
sylius
References
https://github.com/Sylius/Sylius/releases/tag/v1.10.11
https://github.com/Sylius/Sylius/releases/tag/v1.11.2
https://github.com/Sylius/Sylius/releases/tag/v1.9.10
https://github.com/Sylius/Sylius/security/advisories/GHSA-4jp3-q2qm-9fmw
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2022-03-14T19:15:12.173
3 years agoLast modified
2022-03-22T17:32:06.990
3 years ago