Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Denial of Service (DoS) vulnerability was identified in the "Languages" submenu of the Grav admin configuration panel (/admin/config/system). Specifically, the Supported parameter fails to properly validate user input. If a malformed value is inserted—such as a single forward slash (/) or an XSS test string—it causes a fatal regular expression parsing error on the server. This leads to application-wide failure due to the use of the preg_match() function with an improperly constructed regular expression, resulting in an error. Once triggered, the site becomes completely unavailable to all users. This vulnerability is fixed in 1.8.0-beta.27.
| Software | From | Fixed in |
|---|---|---|
getgrav / grav
|
1.7.48 | 1.8.0 |
getgrav / grav
|
1.8.0-beta1 | 1.8.0-beta1.x |
getgrav / grav
|
1.8.0-beta10 | 1.8.0-beta10.x |
getgrav / grav
|
1.8.0-beta11 | 1.8.0-beta11.x |
getgrav / grav
|
1.8.0-beta12 | 1.8.0-beta12.x |
getgrav / grav
|
1.8.0-beta13 | 1.8.0-beta13.x |
getgrav / grav
|
1.8.0-beta14 | 1.8.0-beta14.x |
getgrav / grav
|
1.8.0-beta15 | 1.8.0-beta15.x |
getgrav / grav
|
1.8.0-beta16 | 1.8.0-beta16.x |
getgrav / grav
|
1.8.0-beta17 | 1.8.0-beta17.x |
getgrav / grav
|
1.8.0-beta18 | 1.8.0-beta18.x |
getgrav / grav
|
1.8.0-beta19 | 1.8.0-beta19.x |
getgrav / grav
|
1.8.0-beta2 | 1.8.0-beta2.x |
getgrav / grav
|
1.8.0-beta20 | 1.8.0-beta20.x |
getgrav / grav
|
1.8.0-beta21 | 1.8.0-beta21.x |
getgrav / grav
|
1.8.0-beta22 | 1.8.0-beta22.x |
getgrav / grav
|
1.8.0-beta23 | 1.8.0-beta23.x |
getgrav / grav
|
1.8.0-beta24 | 1.8.0-beta24.x |
getgrav / grav
|
1.8.0-beta25 | 1.8.0-beta25.x |
getgrav / grav
|
1.8.0-beta26 | 1.8.0-beta26.x |
getgrav / grav
|
1.8.0-beta3 | 1.8.0-beta3.x |
getgrav / grav
|
1.8.0-beta4 | 1.8.0-beta4.x |
getgrav / grav
|
1.8.0-beta5 | 1.8.0-beta5.x |
getgrav / grav
|
1.8.0-beta6 | 1.8.0-beta6.x |
getgrav / grav
|
1.8.0-beta7 | 1.8.0-beta7.x |
getgrav / grav
|
1.8.0-beta8 | 1.8.0-beta8.x |
getgrav / grav
|
1.8.0-beta9 | 1.8.0-beta9.x |