cvelist/2024/3xxx/CVE-2024-3938.json

88 lines
3.2 KiB
JSON
Raw Normal View History

2024-04-17 20:00:33 +00:00
{
2024-07-25 22:00:38 +00:00
"data_version": "4.0",
2024-04-17 20:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-3938",
2024-07-25 22:00:38 +00:00
"ASSIGNER": "security@dotcms.com",
"STATE": "PUBLIC"
2024-04-17 20:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-07-25 22:00:38 +00:00
"value": "The \"reset password\" login page accepted an HTML injection via URL parameters.\n\nThis has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E \n\nThis will result in a view along these lines:\n\n\n\n\n\n * OWASP Top 10 - A03: Injection\n * CVSS Score: 5.4\n * AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \n * https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "dotCMS",
"product": {
"product_data": [
{
"product_name": "dotCMS core",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.1.5 and after"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
2024-07-28 14:01:35 +00:00
"url": "https://www.dotcms.com/security/SI-71",
2024-07-25 22:00:38 +00:00
"refsource": "MISC",
2024-07-28 14:01:35 +00:00
"name": "https://www.dotcms.com/security/SI-71"
2024-07-25 22:00:38 +00:00
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
2024-04-17 20:00:33 +00:00
}
]
}
}