cvelist/2022/4xxx/CVE-2022-4581.json

77 lines
2.7 KiB
JSON
Raw Normal View History

2022-12-17 13:00:40 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-4581",
2022-12-17 14:02:28 +01:00
"TITLE": "1j01 mind-map app.coffee cross site scripting",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "1j01",
"product": {
"product_data": [
{
"product_name": "mind-map",
"version": {
"version_data": [
{
2022-12-17 14:00:39 +00:00
"version_value": "n/a"
2022-12-17 14:02:28 +01:00
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting"
}
]
}
]
2022-12-17 13:00:40 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-12-17 14:02:28 +01:00
"value": "A vulnerability was found in 1j01 mind-map and classified as problematic. This issue affects some unknown processing of the file app.coffee. The manipulation of the argument html leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 9617e6084dfeccd92079ab4d7f439300a4b24394. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216167."
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "3.5",
2022-12-17 14:00:39 +00:00
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
2022-12-17 14:02:28 +01:00
}
},
"references": {
"reference_data": [
{
2022-12-17 14:00:39 +00:00
"url": "https://github.com/1j01/mind-map/commit/9617e6084dfeccd92079ab4d7f439300a4b24394",
"refsource": "MISC",
"name": "https://github.com/1j01/mind-map/commit/9617e6084dfeccd92079ab4d7f439300a4b24394"
2022-12-17 14:02:28 +01:00
},
{
2022-12-17 14:00:39 +00:00
"url": "https://vuldb.com/?id.216167",
"refsource": "MISC",
"name": "https://vuldb.com/?id.216167"
2022-12-17 13:00:40 +00:00
}
]
}
}