20 lines
984 B
JSON
Raw Normal View History

{
"id": "CVE-2023-2582",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-05-08T21:15:11.150",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the user's browser."
}
],
"metrics": {},
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2023-18",
"source": "vulnreport@tenable.com"
}
]
}