cvelist/2023/49xxx/CVE-2023-49950.json

67 lines
2.4 KiB
JSON
Raw Normal View History

2023-12-03 20:00:32 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2024-02-03 09:00:35 +00:00
"ID": "CVE-2023-49950",
"STATE": "PUBLIC"
2023-12-03 20:00:32 +00:00
},
2024-02-03 09:00:35 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2023-12-03 20:00:32 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2024-02-03 09:00:35 +00:00
"value": "The Jinja templating in Logpoint SIEM 6.10.0 through 7.x before 7.3.0 does not correctly sanitize log data being displayed when using a custom Jinja template in the Alert view. A remote attacker can craft a cross-site scripting (XSS) payload and send it to any system or device that sends logs to the SIEM. If an alert is created, the payload will execute upon the alert data being viewed with that template, which can lead to sensitive data disclosure."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://servicedesk.logpoint.com/hc/en-us/articles/14124495377437-Stored-XSS-Vulnerability-in-Alerts-via-Log-Injection",
"refsource": "MISC",
"name": "https://servicedesk.logpoint.com/hc/en-us/articles/14124495377437-Stored-XSS-Vulnerability-in-Alerts-via-Log-Injection"
},
{
"refsource": "MISC",
"name": "https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md",
"url": "https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md"
2023-12-03 20:00:32 +00:00
}
]
}
}