Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-24864
HistoryApr 20, 2022 - 6:25 p.m.

CVE-2022-24864 Malicious Javascript injection in OriginProtocol/origin-website

2022-04-2018:25:12
CWE-79
GitHub_M
www.cve.org
1
cve-2022-24864
malicious javascript
originprotocol/origin-website
blockchain
post request
sendgrid
email injection
xss
vulnerabilities
html injection
workaround

CVSS3

4.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

25.8%

Origin Protocol is a blockchain based project. The Origin Protocol project website allows for malicious users to inject malicious Javascript via a POST request to /presale/join. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the [email protected]. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipient’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email. There are currently no known workarounds.

CNA Affected

[
  {
    "product": "origin-website",
    "vendor": "OriginProtocol",
    "versions": [
      {
        "status": "affected",
        "version": "< c12d2f2"
      }
    ]
  }
]

CVSS3

4.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N

AI Score

5.8

Confidence

High

EPSS

0.001

Percentile

25.8%

Related for CVELIST:CVE-2022-24864