Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-092A4423C1ED5C7DBF7D2DBF0D4210D8
HistoryMay 17, 2022 - 12:00 a.m.

Djblets Cross-site scripting Vulnerability

2022-05-1700:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
7
djblets
cross-site scripting
xss
vulnerability
gravatars
templatetags
django
remote attackers
arbitrary web script
html
user display name

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

5.2

Confidence

High

EPSS

0.003

Percentile

65.7%

A cross-site scripting (XSS) vulnerability in gravatars/templatetags/gravatars.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django allows remote attackers to inject arbitrary web script or HTML via a user display name.

Affected configurations

Vulners
Node
pypiml-scannerRange<0.7.30pypi
OR
pypiml-scannerRange0.8pypi
OR
pypiml-scannerRange<0.8.3pypi
VendorProductVersionCPE
pypiml-scanner*cpe:2.3:a:pypi:ml-scanner:*:*:*:*:*:pypi:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

5.2

Confidence

High

EPSS

0.003

Percentile

65.7%

Related for GITLAB-092A4423C1ED5C7DBF7D2DBF0D4210D8