mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
Modify CVE-2023-28836 for GHSA-5286-f2rf-35c2
This commit is contained in:
parent
e0b78640a3
commit
60030d2565
@ -1,38 +1,14 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-28836",
|
||||
"ASSIGNER": "security-advisories@github.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Wagtail is an open source content management system built on Django. Starting in version 1.5 and prior to versions 4.1.4 and 4.2.2, a stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled. For page, the vulnerability is in the \"Choose a parent page\" ModelAdmin view (`ChooseParentView`), available when managing pages via ModelAdmin. For documents, the vulnerability is in the ModelAdmin Inspect view (`InspectView`) when displaying document fields. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2. Site owners who are unable to upgrade to the new versions can disable or override the corresponding functionality."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
|
||||
"cweId": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
"ID": "CVE-2023-28836",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Wagtail vulnerable to stored Cross-site Scripting attack via ModelAdmin views"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "wagtail",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
@ -40,91 +16,131 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": ">= 1.5, < 4.1.4"
|
||||
"version_affected": ">=",
|
||||
"version_name": "1.5",
|
||||
"version_value": "1.5"
|
||||
},
|
||||
{
|
||||
"version_affected": "=",
|
||||
"version_value": ">= 4.2, < 4.2.2"
|
||||
"version_affected": "<",
|
||||
"version_name": "4.1.1",
|
||||
"version_value": "4.1.1"
|
||||
},
|
||||
{
|
||||
"version_affected": ">=",
|
||||
"version_name": "4.2",
|
||||
"version_value": "4.2"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "4.2.2",
|
||||
"version_value": "4.2.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"vendor_name": "wagtail"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Wagtail is an open source content management system built on Django. Starting in version 1.5 and prior to versions 4.1.4 and 4.2.2, a stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled.\n\nFor page, the vulnerability is in the \"Choose a parent page\" ModelAdmin view (`ChooseParentView`), available when managing pages via ModelAdmin.\n\nFor documents, the vulnerability is in the ModelAdmin Inspect view (`InspectView`) when displaying document fields.\n\nPatched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2. Site owners who are unable to upgrade to the new versions can disable or override the corresponding functionality."
|
||||
}
|
||||
]
|
||||
},
|
||||
"generator": {
|
||||
"engine": "Vulnogram 0.0.9"
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-79 Cross-site Scripting (XSS)"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-5286-f2rf-35c2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/wagtail/wagtail/security/advisories/GHSA-5286-f2rf-35c2"
|
||||
"name": "https://github.com/wagtail/wagtail/security/advisories/GHSA-5286-f2rf-35c2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-5286-f2rf-35c2"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wagtail/wagtail/commit/158acef60615bbeeae07713b2888dad07b0ee1ff",
|
||||
"name": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/wagtail/wagtail/commit/158acef60615bbeeae07713b2888dad07b0ee1ff"
|
||||
"url": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wagtail/wagtail/commit/714147964a532d9797d33284f5db93d231204978",
|
||||
"name": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/wagtail/wagtail/commit/714147964a532d9797d33284f5db93d231204978"
|
||||
"url": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713",
|
||||
"name": "https://github.com/wagtail/wagtail/commit/5be2b1ed55fd7259dfdf2c82e7701dba407b8b62",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713"
|
||||
"url": "https://github.com/wagtail/wagtail/commit/5be2b1ed55fd7259dfdf2c82e7701dba407b8b62"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wagtail/wagtail/commit/eefc3381d37b476791610e5d30594fae443f33af",
|
||||
"name": "https://github.com/wagtail/wagtail/commit/ff806ab173a504395fdfb3139eb0a29444ab4b91",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/wagtail/wagtail/commit/eefc3381d37b476791610e5d30594fae443f33af"
|
||||
"url": "https://github.com/wagtail/wagtail/commit/ff806ab173a504395fdfb3139eb0a29444ab4b91"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#customising-chooseparentview",
|
||||
"name": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#customising-chooseparentview",
|
||||
"refsource": "MISC",
|
||||
"name": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#customising-chooseparentview"
|
||||
"url": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#customising-chooseparentview"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview",
|
||||
"name": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview",
|
||||
"refsource": "MISC",
|
||||
"name": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview"
|
||||
"url": "https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wagtail/wagtail/releases/tag/v4.1.4",
|
||||
"name": "https://github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/wagtail/wagtail/releases/tag/v4.1.4"
|
||||
"url": "https://github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2",
|
||||
"name": "https://github.com/wagtail/wagtail/commit/eefc3381d37b476791610e5d30594fae443f33af",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/wagtail/wagtail/releases/tag/v4.2.2"
|
||||
"url": "https://github.com/wagtail/wagtail/commit/eefc3381d37b476791610e5d30594fae443f33af"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"advisory": "GHSA-5286-f2rf-35c2",
|
||||
"defect": [
|
||||
"GHSA-5286-f2rf-35c2"
|
||||
],
|
||||
"discovery": "UNKNOWN"
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"attackComplexity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"scope": "CHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user