83 lines
2.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2023-0357",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-04-04T23:15:07.153",
"lastModified": "2023-04-10T18:17:47.230",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Helpy version 2.8.0 allows an unauthenticated remote attacker to exploit an XSS stored in the application. This is possible because the application does not correctly validate the attachments sent by customers in the ticket."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:helpy.io:helpy:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F7548AEC-F6A1-40AE-8378-B5A1BFB8A8BE"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/quayle/",
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/helpyio/helpy/",
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}