mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
72 lines
2.3 KiB
JSON
72 lines
2.3 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2022-29894",
|
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Strapi",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Strapi",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "v3.x.x versions and earlier"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site scripting"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://strapi.io/",
|
|
"refsource": "MISC",
|
|
"name": "https://strapi.io/"
|
|
},
|
|
{
|
|
"url": "https://github.com/strapi/strapi",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/strapi/strapi"
|
|
},
|
|
{
|
|
"url": "https://jvn.jp/en/jp/JVN44550983/index.html",
|
|
"refsource": "MISC",
|
|
"name": "https://jvn.jp/en/jp/JVN44550983/index.html"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege."
|
|
}
|
|
]
|
|
}
|
|
} |