Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. silverstripe/framework
  4. ›
  5. SS-2016-010

SS-2016-010: ReadOnly transformation for formfields exploitable

November 29, 2016

Form fields returning isReadonly() as true are vulnerable to reflected XSS injections. This includes ReadonlyField, LookupField, HTMLReadonlyField, as well as special purpose fields like TimeField_Readonly. Values submitted to through these form fields are not filtered out from the form session data, and might be shown to the user depending on the form behaviour. For example, form validation errors cause the form to re-render with previously submitted values by default. SilverStripe forms automatically load values from request data (GET and POST), which enables malicious use of URLs if your form uses these fields and does not overwrite data on form construction. Readonly and disabled form fields are already filtered out in saveInto(), so maliciously submitted data on these fields does not make it into the database unless you are accessing form values directly in your saving logic.

References

  • www.silverstripe.org/download/security-releases/ss-2016-010/

Code Behaviors & Features

Detect and mitigate SS-2016-010 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.1.21, all versions starting from 3.2.0-alpha0 before 3.2.6, all versions starting from 3.3.0-alpha0 before 3.3.4, all versions starting from 3.4.0-alpha0 before 3.4.2

Fixed versions

  • 3.1.21
  • 3.2.6
  • 3.3.4
  • 3.4.2

Solution

Upgrade to versions 3.1.21, 3.2.6, 3.3.4, 3.4.2 or above.

Source file

packagist/silverstripe/framework/SS-2016-010.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:06 +0000.