From c8484e8352518a09a2ed65de3acb2478296bfd07 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 31 Jan 2023 04:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/4xxx/CVE-2022-4898.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2022/4xxx/CVE-2022-4898.json b/2022/4xxx/CVE-2022-4898.json index df5feca5167..da71c5aa1d6 100644 --- a/2022/4xxx/CVE-2022-4898.json +++ b/2022/4xxx/CVE-2022-4898.json @@ -76,7 +76,7 @@ "description_data": [ { "lang": "eng", - "value": "In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS" + "value": "In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS" } ] }