cvelist/2022/29xxx/CVE-2022-29894.json

72 lines
2.3 KiB
JSON
Raw Normal View History

2022-05-06 03:01:22 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-29894",
2022-06-13 05:01:45 +00:00
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
2022-06-13 13:30:36 +09:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Strapi",
"product": {
"product_data": [
{
"product_name": "Strapi",
"version": {
"version_data": [
{
"version_value": "v3.x.x versions and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
2022-06-13 05:01:45 +00:00
"url": "https://strapi.io/",
"refsource": "MISC",
"name": "https://strapi.io/"
2022-06-13 13:30:36 +09:00
},
{
2022-06-13 05:01:45 +00:00
"url": "https://github.com/strapi/strapi",
"refsource": "MISC",
"name": "https://github.com/strapi/strapi"
2022-06-13 13:30:36 +09:00
},
{
2022-06-13 05:01:45 +00:00
"url": "https://jvn.jp/en/jp/JVN44550983/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN44550983/index.html"
2022-06-13 13:30:36 +09:00
}
]
2022-05-06 03:01:22 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-06-13 13:30:36 +09:00
"value": "Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege."
2022-05-06 03:01:22 +00:00
}
]
}
}