Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-44AAE9F823FE297072E36365F34D76C7
HistoryMay 17, 2022 - 12:00 a.m.

Djiblets Cross-site scripting Vulnerability via JSON Objects

2022-05-1700:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
15
djblets
xss
json
django
review board

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

7.7

Confidence

High

EPSS

0.002

Percentile

61.0%

A cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.

Affected configurations

Vulners
Node
pypiml-scannerRange<0.7.30pypi
OR
pypiml-scannerRange0.8pypi
OR
pypiml-scannerRange<0.8.3pypi
VendorProductVersionCPE
pypiml-scanner*cpe:2.3:a:pypi:ml-scanner:*:*:*:*:*:pypi:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

7.7

Confidence

High

EPSS

0.002

Percentile

61.0%

Related for GITLAB-44AAE9F823FE297072E36365F34D76C7