Description
Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Templating functionality, allowing authenticated users with "System -> Add/Edit custom modules and templates" permissions to manipulate Twig filters and execute arbitrary server-side functions as the web server user. This issue is fixed in version 4.3.1. To workaround this issue, use the 4.1 and 4.2 patch commits.
Problem types
CWE-94: Improper Control of Generation of Code ('Code Injection')
CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
Product status
References
github.com/...bo-cms/security/advisories/GHSA-7rmm-689c-gjgv
github.com/...ommit/0f4e88396111ea027785a48dd8f5eeb14536bd71
github.com/...ommit/ecd4f9d2cea739a46756a108a839cac80f65cf10
github.com/xibosignage/xibo-cms/releases/tag/4.3.1
patch-diff.githubusercontent.com/...xibo-cms/pull/3128.patch