cvelist/2022/43xxx/CVE-2022-43984.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2022-10-28 20:00:31 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-43984",
2022-11-25 17:00:34 +00:00
"ASSIGNER": "help@fluidattacks.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Browsershot",
"version": {
"version_data": [
{
"version_value": "3.57.3"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Server Side XSS"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://fluidattacks.com/advisories/malone/",
"url": "https://fluidattacks.com/advisories/malone/"
},
{
"refsource": "MISC",
"name": "https://github.com/spatie/browsershot/",
"url": "https://github.com/spatie/browsershot/"
}
]
2022-10-28 20:00:31 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-11-25 17:00:34 +00:00
"value": "Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol."
2022-10-28 20:00:31 +00:00
}
]
}
}