Lucene search

K
githubGitHub Advisory DatabaseGHSA-58W4-W77W-QV3W
HistoryNov 16, 2020 - 9:23 p.m.

Reflected XSS with parameters in PostComment

2020-11-1621:23:29
CWE-79
GitHub Advisory Database
github.com
28
reflected xss
postcomment
fixed in 4.2.0
malicious link
web browsers

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

EPSS

0.001

Percentile

29.3%

Impact

An attacker could inject malicious web code into the users’ web browsers by creating a malicious link.

Patches

The problem is fixed in 4.2.0

References

Cross-site Scripting (XSS) - Reflected (CWE-79)

Affected configurations

Vulners
Node
prestashopproductcommentsRange4.0.04.2.0
VendorProductVersionCPE
prestashopproductcomments*cpe:2.3:a:prestashop:productcomments:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

EPSS

0.001

Percentile

29.3%

Related for GHSA-58W4-W77W-QV3W