CVE-2024-47056 (GCVE-0-2024-47056)
Vulnerability from cvelistv5
Published
2025-05-28 16:24
Modified
2025-05-28 23:47
CWE
  • CWE-312 - Cleartext Storage of Sensitive Information
Summary
SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations. Sensitive Information Disclosure via .env File Exposure: The .env file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL. MitigationUpdate Mautic to the latest Mautic version. By default, Mautic does not use .env files for production data. For Apache users: Ensure your web server is configured to respect .htaccess files. For Nginx users: As Nginx does not inherently support .htaccess files, you must manually add a configuration block to your Nginx server configuration to deny access to .env files. Add the following to your Nginx configuration for the Mautic site: location ~ /\.env { deny all; } After modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect.
Impacted products
Vendor Product Version
Mautic Mautic Version: > 4.4.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47056",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-28T23:45:38.445428Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T23:47:09.780Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://packagist.org",
          "defaultStatus": "unaffected",
          "packageName": "mautic/core",
          "product": "Mautic",
          "repo": "https://github.com/mautic/mautic",
          "vendor": "Mautic",
          "versions": [
            {
              "lessThan": "\u003c 6.0.2, \u003c 5.2.6, \u003c4.4.16",
              "status": "affected",
              "version": "\u003e 4.4.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "r3ky"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "r3ky"
        },
        {
          "lang": "en",
          "type": "analyst",
          "value": "Lenon Leite"
        },
        {
          "lang": "en",
          "type": "remediation developer",
          "value": "Nick Vanpraet"
        },
        {
          "lang": "en",
          "type": "remediation reviewer",
          "value": "Patryk Gruszka"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003ch3\u003eSummary\u003c/h3\u003e\u003cp\u003eThis advisory addresses a security vulnerability in Mautic where sensitive \u003ccode\u003e.env\u003c/code\u003e\u0026nbsp;configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations.\u003c/p\u003e\u003cp\u003eSensitive Information Disclosure via \u003ccode\u003e.env\u003c/code\u003e\u0026nbsp;File Exposure: The \u003ccode\u003e.env\u003c/code\u003e\u0026nbsp;file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL.\u003c/p\u003e\u003ch3\u003eMitigation\u003c/h3\u003e\u003cp\u003eUpdate Mautic to the latest Mautic version.\u003c/p\u003e\u003cp\u003e\u003cb\u003eBy default, Mautic does not use \u003c/b\u003e\u003ccode\u003e\u003cb\u003e.env\u003c/b\u003e\u003c/code\u003e\u003cb\u003e\u0026nbsp;files for production data.\u003c/b\u003e\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFor Apache users:\u003c/strong\u003e\u0026nbsp;Ensure your web server is configured to respect \u003ccode\u003e.htaccess\u003c/code\u003e\u0026nbsp;files.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFor Nginx users:\u003c/strong\u003e\u0026nbsp;As Nginx does not inherently support \u003ccode\u003e.htaccess\u003c/code\u003e\u0026nbsp;files, you must manually add a configuration block to your Nginx server configuration to deny access to \u003ccode\u003e.env\u003c/code\u003e\u0026nbsp;files. Add the following to your Nginx configuration for the Mautic site:\u003c/p\u003e\u003cdiv\u003e\u003cpre\u003elocation ~ /\\.env {\n    deny all;\n}\u003c/pre\u003e\u003cdiv\u003e\u003c/div\u003e\u003c/div\u003e\u003cp\u003eAfter modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env\u00a0configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations.\n\nSensitive Information Disclosure via .env\u00a0File Exposure: The .env\u00a0file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL.\n\nMitigationUpdate Mautic to the latest Mautic version.\n\nBy default, Mautic does not use .env\u00a0files for production data.\n\nFor Apache users:\u00a0Ensure your web server is configured to respect .htaccess\u00a0files.\n\nFor Nginx users:\u00a0As Nginx does not inherently support .htaccess\u00a0files, you must manually add a configuration block to your Nginx server configuration to deny access to .env\u00a0files. Add the following to your Nginx configuration for the Mautic site:\n\nlocation ~ /\\.env {\n    deny all;\n}\n\n\n\n\n\nAfter modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-312",
              "description": "CWE-312 Cleartext Storage of Sensitive Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-28T16:24:57.162Z",
        "orgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e",
        "shortName": "Mautic"
      },
      "references": [
        {
          "url": "https://github.com/mautic/mautic/security/advisories/GHSA-h2wg-v8wg-jhxh"
        }
      ],
      "source": {
        "advisory": "GHSA-h2wg-v8wg-jhxh",
        "discovery": "EXTERNAL"
      },
      "title": "Mautic does not shield .env files from web traffic",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e",
    "assignerShortName": "Mautic",
    "cveId": "CVE-2024-47056",
    "datePublished": "2025-05-28T16:24:57.162Z",
    "dateReserved": "2024-09-17T13:41:00.584Z",
    "dateUpdated": "2025-05-28T23:47:09.780Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-47056\",\"sourceIdentifier\":\"security@mautic.org\",\"published\":\"2025-05-28T17:15:23.547\",\"lastModified\":\"2025-05-29T14:29:50.247\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env\u00a0configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations.\\n\\nSensitive Information Disclosure via .env\u00a0File Exposure: The .env\u00a0file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL.\\n\\nMitigationUpdate Mautic to the latest Mautic version.\\n\\nBy default, Mautic does not use .env\u00a0files for production data.\\n\\nFor Apache users:\u00a0Ensure your web server is configured to respect .htaccess\u00a0files.\\n\\nFor Nginx users:\u00a0As Nginx does not inherently support .htaccess\u00a0files, you must manually add a configuration block to your Nginx server configuration to deny access to .env\u00a0files. Add the following to your Nginx configuration for the Mautic site:\\n\\nlocation ~ /\\\\.env {\\n    deny all;\\n}\\n\\n\\n\\n\\n\\nAfter modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect.\"},{\"lang\":\"es\",\"value\":\"Resumen: Este aviso aborda una vulnerabilidad de seguridad en Mautic que permite acceder directamente a archivos de configuraci\u00f3n .env confidenciales a trav\u00e9s de un navegador web. Esta exposici\u00f3n podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n confidencial, como credenciales de bases de datos, claves de API y otras configuraciones cr\u00edticas del sistema. Divulgaci\u00f3n de informaci\u00f3n confidencial mediante la exposici\u00f3n de archivos .env: El archivo .env, que suele contener variables de entorno y configuraciones confidenciales de aplicaciones, es accesible directamente a trav\u00e9s de un navegador web debido a la falta de configuraciones del servidor web que restringen el acceso a dichos archivos. Esto permite que un atacante no autenticado vea el contenido de este archivo simplemente accediendo a su URL. Mitigaci\u00f3n: Actualice Mautic a la \u00faltima versi\u00f3n. De forma predeterminada, Mautic no utiliza archivos .env para datos de producci\u00f3n. Para usuarios de Apache: Aseg\u00farese de que su servidor web est\u00e9 configurado para respetar los archivos .htaccess. Para usuarios de Nginx: Dado que Nginx no admite archivos .htaccess de forma inherente, debe agregar manualmente un bloque de configuraci\u00f3n a la configuraci\u00f3n de su servidor Nginx para denegar el acceso a los archivos .env. Agregue lo siguiente a su configuraci\u00f3n de Nginx para el sitio de Mautic: location ~ /\\\\.env { deny all; } Despu\u00e9s de modificar su configuraci\u00f3n de Nginx, recuerde volver a cargar o reiniciar su servicio Nginx para que los cambios surtan efecto.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@mautic.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\",\"baseScore\":5.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.5,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@mautic.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]}],\"references\":[{\"url\":\"https://github.com/mautic/mautic/security/advisories/GHSA-h2wg-v8wg-jhxh\",\"source\":\"security@mautic.org\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47056\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-28T23:45:38.445428Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-28T23:46:07.419Z\"}}], \"cna\": {\"title\": \"Mautic does not shield .env files from web traffic\", \"source\": {\"advisory\": \"GHSA-h2wg-v8wg-jhxh\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"r3ky\"}, {\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"r3ky\"}, {\"lang\": \"en\", \"type\": \"analyst\", \"value\": \"Lenon Leite\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Nick Vanpraet\"}, {\"lang\": \"en\", \"type\": \"remediation reviewer\", \"value\": \"Patryk Gruszka\"}], \"impacts\": [{\"capecId\": \"CAPEC-180\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/mautic/mautic\", \"vendor\": \"Mautic\", \"product\": \"Mautic\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e 4.4.0\", \"lessThan\": \"\u003c 6.0.2, \u003c 5.2.6, \u003c4.4.16\", \"versionType\": \"semver\"}], \"packageName\": \"mautic/core\", \"collectionURL\": \"https://packagist.org\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://github.com/mautic/mautic/security/advisories/GHSA-h2wg-v8wg-jhxh\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env\\u00a0configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations.\\n\\nSensitive Information Disclosure via .env\\u00a0File Exposure: The .env\\u00a0file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL.\\n\\nMitigationUpdate Mautic to the latest Mautic version.\\n\\nBy default, Mautic does not use .env\\u00a0files for production data.\\n\\nFor Apache users:\\u00a0Ensure your web server is configured to respect .htaccess\\u00a0files.\\n\\nFor Nginx users:\\u00a0As Nginx does not inherently support .htaccess\\u00a0files, you must manually add a configuration block to your Nginx server configuration to deny access to .env\\u00a0files. Add the following to your Nginx configuration for the Mautic site:\\n\\nlocation ~ /\\\\.env {\\n    deny all;\\n}\\n\\n\\n\\n\\n\\nAfter modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003ch3\u003eSummary\u003c/h3\u003e\u003cp\u003eThis advisory addresses a security vulnerability in Mautic where sensitive \u003ccode\u003e.env\u003c/code\u003e\u0026nbsp;configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations.\u003c/p\u003e\u003cp\u003eSensitive Information Disclosure via \u003ccode\u003e.env\u003c/code\u003e\u0026nbsp;File Exposure: The \u003ccode\u003e.env\u003c/code\u003e\u0026nbsp;file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL.\u003c/p\u003e\u003ch3\u003eMitigation\u003c/h3\u003e\u003cp\u003eUpdate Mautic to the latest Mautic version.\u003c/p\u003e\u003cp\u003e\u003cb\u003eBy default, Mautic does not use \u003c/b\u003e\u003ccode\u003e\u003cb\u003e.env\u003c/b\u003e\u003c/code\u003e\u003cb\u003e\u0026nbsp;files for production data.\u003c/b\u003e\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFor Apache users:\u003c/strong\u003e\u0026nbsp;Ensure your web server is configured to respect \u003ccode\u003e.htaccess\u003c/code\u003e\u0026nbsp;files.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFor Nginx users:\u003c/strong\u003e\u0026nbsp;As Nginx does not inherently support \u003ccode\u003e.htaccess\u003c/code\u003e\u0026nbsp;files, you must manually add a configuration block to your Nginx server configuration to deny access to \u003ccode\u003e.env\u003c/code\u003e\u0026nbsp;files. Add the following to your Nginx configuration for the Mautic site:\u003c/p\u003e\u003cdiv\u003e\u003cpre\u003elocation ~ /\\\\.env {\\n    deny all;\\n}\u003c/pre\u003e\u003cdiv\u003e\u003c/div\u003e\u003c/div\u003e\u003cp\u003eAfter modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect.\u003c/p\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-312\", \"description\": \"CWE-312 Cleartext Storage of Sensitive Information\"}]}], \"providerMetadata\": {\"orgId\": \"4e531c38-7a33-45d3-98dd-d909c0d8852e\", \"shortName\": \"Mautic\", \"dateUpdated\": \"2025-05-28T16:24:57.162Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-47056\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-28T23:47:09.780Z\", \"dateReserved\": \"2024-09-17T13:41:00.584Z\", \"assignerOrgId\": \"4e531c38-7a33-45d3-98dd-d909c0d8852e\", \"datePublished\": \"2025-05-28T16:24:57.162Z\", \"assignerShortName\": \"Mautic\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…