Security release for all versions of Mautic prior to 2.16.5 and 3.2.4

We have made available for immediate download an out-of-sequence release for both Mautic 2.x and 3.x. 

We have also published some resources on the website:

This release addresses:

  1. A Moderately Critical Vulnerability (Vulnerability 1) reported by Dardan Prebreza at Bishop Fox, and  
  2. A Highly Critical Vulnerability (Vulnerability 2) reported by Naveen Sunkavally at Horizon3.ai.

Risk Ratings

These are based on the information in the ‘how we triage, resolve and release fixes for security issues’ page above.

Vulnerability 1

12/25 (Moderately Critical) AC:Complex/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All

Vulnerability 2

22/25 (Highly Critical) AC:None/A:None/CI:All/II:All/E:Theoretical/TD:All

As Vulnerability 2 affects every released version of Mautic and allows an attacker to create a user in Mautic with elevated privileges, all users are strongly urged to update immediately.

More information can be found in the CVE reports here – details will be added following the release: 

Vulnerability 1

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35128

Vulnerability 2

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35124

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35125

Patches

The easiest way to protect your Mautic instances is to simply update to 2.16.5 or 3.2.4 in the usual way. If you are unable to do this for any reason, the patch files are provided below.

Fix for both vulnerabilities

Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4…2.16.5.diff

Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2…3.2.4.diff

⚠️ Important note for users who are currently running 3.2.0 or later

Are you currently using Mautic 3.2.0 or later and do you update through the CLI (Command Line Interface)? Then the message below applies to you! This does not apply if you’re updating through the UI (graphical interface).

When you’re trying to update through the CLI, you might run into the following error:

Notice: Undefined index: message in /var/www/html/app/bundles/CoreBundle/Update/Step/InstallNewFilesStep.php on line 131

Failed to execute command php bin/console mautic:update:apply: exit status 1

This bug was introduced in Mautic 3.2.0 and fixed in 3.2.4. Please use the following workaround:

wget https://github.com/mautic/mautic/releases/download/3.2.4/3.2.4-update.zip
php bin/console mautic:update:apply --update-package=3.2.4-update.zip
php bin/console mautic:update:apply --finish

How to scan for attempts to exploit the vulnerability

We have also provided some searches that you can do to see if there have been attempts to exploit the highly critical vulnerability.  

Check for exploit attempts – Vulnerability 1

To see if there was an attempt at this vulnerability, run the following queries replacing PREFIX_ with your own if configured: 

  • >select * from PREFIX_companies where companyname like ‘%<%' or companyname like '%onerror%';

Check for exploit attempts – Vulnerability 2

The first and absolutely necessary step is to check if there are any unrecognized users listed in Mautic’s User manager. Delete or unpublish any not recognized immediately. 

To see if there was an attempt at this vulnerability, run the following queries replacing PREFIX_ with your own if configured:  

  • >select * from PREFIX_form_submissions where referer like ‘%<%' or referer like '%onerror%';
  • >select * from PREFIX_asset_downloads where referer like ‘%<%' or referer like '%onerror%';
  • >select * from PREFIX_companies where companyname like ‘%<%' or companyname like '%onerror%';

If there are any results returned, review them to look for HTML tags. If it looks like HTML is embedded, delete the entry from the database. 

Credits

Thanks to Dardan Prebreza at Bishop Fox and Naveen Sunkavally at Horizon3.ai for responsibly reporting these vulnerabilities.

Thanks to Alan Hartless at Acquia and Dennis Ameling for fixing these vulnerabilities.

Addendum

After the release was made, a bug was identified which affects command-line updates in Mautic 3.2.0 and later. This bug was introduced back in Mautic 3.2.0 but was causing problems for people updating at the command line.  As a result, we issued 3.2.4 to address this issue.

Share this blog article:
Picture of Ruth Cheesley

Ruth Cheesley

Ruth is an Open Source advocate with over 18 years of experience using and contributing to many different projects. Having served on the Community Leadership Team of the Joomla! project and built a full-service digital agency, she now works as Project Lead for Mautic, supporting the community who build and maintain the world’s first Open Source Marketing Automation platform. Ruth is a lover of cats, a keen runner and flautist (but not at the same time!) and is based in the East of England.

More 📝's in

Yellow background with mautic logo top left, Mautic 7.0 columba edition written in text, features bullet pointed: A glimpse at new features: Import and export campaigns Organize your marketing resources with projects Smarter segment-based email sending Multilingual support for SMS and notifications Improved workflows for scheduling emails API v2 based on API Platform, and also an explanation of the constellation shown: Columba is a southern constellation representing a dove in flight. Though less prominent than its northern neighbors, Columba contains the globular cluster NGC 1851, a dense collection of ancient stars visible through telescopes. Named in the 16th century by Dutch astronomer Petrus Plancius, Columba represents the dove from Noah's Ark that returned bearing an olive branch, symbolizing hope and peace after the great flood. In its celestial position south of Orion and Lepus (the Hare), some interpretations suggest the dove fleeing from the hunter. The constellation embodies themes of peace, renewal, and divine guidance across various traditions, serving as a quieter but meaningful counterpart to the more dramatic figures of the night sky.
Product news

Mautic 7: Columba Edition is released

Today we’ve released Mautic 7.0: Columba Edition. It’s here.

This is a full term release with a four-year support cycle – one year active, one year security, two years Extended Long Term Support. Read more about our release strategy.

Search

Use the search bar above by typing terms and pressing enter.