{ "id": "CVE-2024-38354", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T20:15:04.293", "lastModified": "2024-11-21T09:25:25.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CodiMD allows realtime collaborative markdown notes on all platforms. The notebook feature of Hackmd.io permits the rendering of iframe `HTML` tags with an improperly sanitized `name` attribute. This vulnerability enables attackers to perform cross-site scripting (XSS) attacks via DOM clobbering. This vulnerability is fixed in 2.5.4." }, { "lang": "es", "value": "CodiMD permite notas de markdown colaborativas en tiempo real en todas las plataformas. La funci\u00f3n de cuaderno de Hackmd.io permite la representaci\u00f3n de etiquetas \"HTML\" de iframe con un atributo \"name\" incorrectamente sanitizado. Esta vulnerabilidad permite a los atacantes realizar ataques de cross-site scripting (XSS) mediante destrucci\u00f3n de DOM. Esta vulnerabilidad se solucion\u00f3 en 2.5.4." } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 5.2 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-79" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:hackmd:codimd:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.5.4", "matchCriteriaId": "D7E637C4-B5FD-4D4C-B417-3EBFAF7B0AEC" } ] } ] } ], "references": [ { "url": "https://github.com/hackmdio/codimd/security/advisories/GHSA-22jv-vch8-2vp9", "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "https://github.com/hackmdio/codimd/security/advisories/GHSA-22jv-vch8-2vp9", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ] } ] }