{ "id": "CVE-2023-5562", "sourceIdentifier": "security@knime.com", "published": "2023-10-12T20:15:12.583", "lastModified": "2024-11-21T08:42:01.327", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.\n\n\n\n\nKNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal . However, these are off by default which allows for cross-site scripting attacks.\n\n\nKNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor's knime.ini.\n\n\n" }, { "lang": "es", "value": "Una configuraci\u00f3n predeterminada insegura en KNIME Analytics Platform anterior a 5.2.0 permite un ataque de Cross-Site Scripting (XSS). Cuando se utiliza KNIME Analytics Platform como ejecutor de KNIME Server o KNIME Business Hub, varios nodos de vista basados en JavaScript no sanitizan los datos que se muestran de forma predeterminada. Si los datos a mostrar contienen JavaScript, este c\u00f3digo se ejecuta en el navegador y puede realizar cualquier operaci\u00f3n que el usuario actual pueda realizar de forma silenciosa. KNIME Analytics Platform ya cuenta con opciones de configuraci\u00f3n con las que se puede activar la sanitizaci\u00f3n de datos, consulte https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal, https://docs.knime.com/ \u00faltimo/webportal_admin_guide/index.html#html-sanitizaci\u00f3n-webportal. Sin embargo, est\u00e1n desactivados de forma predeterminada, lo que permite ataques de Cross-Site Scripting (XSS). KNIME Analytics Platform 5.2.0 habilitar\u00e1 la sanitizaci\u00f3n de forma predeterminada. Para todas las versiones anteriores, recomendamos a los usuarios agregar las configuraciones correspondientes al knime.ini del ejecutor." } ], "metrics": { "cvssMetricV31": [ { "source": "security@knime.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "security@knime.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-79" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:knime:knime_analytics_platform:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.2.0", "matchCriteriaId": "3D912A75-E051-445D-B503-5BB95AB0A802" } ] } ] } ], "references": [ { "url": "https://www.knime.com/security/advisories#CVE-2023-5562", "source": "security@knime.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.knime.com/security/advisories#CVE-2023-5562", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }