64 lines
2.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-56364",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-23T16:15:07.770",
"lastModified": "2024-12-23T16:15:07.770",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SimpleXLSX is software for parsing and retrieving data from Excel XLSx files. Starting in 1.0.12 and ending in 1.1.13, when calling the extended toHTMLEx method, it is possible to execute arbitrary JavaScript code. This vulnerability is fixed in 1.1.13."
},
{
"lang": "es",
"value": "SimpleXLSX es un software para analizar y recuperar datos de archivos Excel XLSx. A partir de 1.0.12 y finalizando en 1.1.13, al llamar al m\u00e9todo toHTMLEx extendido, es posible ejecutar c\u00f3digo JavaScript arbitrario. Esta vulnerabilidad se solucion\u00f3 en 1.1.13."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/shuchkin/simplexlsx/commit/71a5e3d40d14e33161f8a40b3fd02de542218ef0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/shuchkin/simplexlsx/security/advisories/GHSA-r87q-fj25-f8jf",
"source": "security-advisories@github.com"
}
]
}