2024-07-14 02:06:08 +00:00

64 lines
2.9 KiB
JSON

{
"id": "CVE-2023-50717",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-14T14:17:01.190",
"lastModified": "2024-05-14T16:13:02.773",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NocoDB is software for building databases as spreadsheets. Starting in verson 0.202.6 and prior to version 0.202.10, an attacker can upload a html file with malicious content. If user tries to open that file in browser malicious scripts can be executed leading stored cross-site scripting attack. This allows remote attacker to execute JavaScript code in the context of the user accessing the vector. An attacker could have used this vulnerability to execute requests in the name of a logged-in user or potentially collect information about the attacked user by displaying a malicious form. Version 0.202.10 contains a patch for the issue.\n"
},
{
"lang": "es",
"value": "NocoDB es un software para crear bases de datos como hojas de c\u00e1lculo. A partir de la versi\u00f3n 0.202.6 y anteriores a la versi\u00f3n 0.202.10, un atacante puede cargar un archivo html con contenido malicioso. Si el usuario intenta abrir ese archivo en el navegador, se pueden ejecutar script maliciosas, lo que lleva a un ataque de Cross Site Scripting almacenados. Esto permite a un atacante remoto ejecutar c\u00f3digo JavaScript en el contexto del usuario que accede al vector. Un atacante podr\u00eda haber utilizado esta vulnerabilidad para ejecutar solicitudes en nombre de un usuario que inici\u00f3 sesi\u00f3n o potencialmente recopilar informaci\u00f3n sobre el usuario atacado mostrando un formulario malicioso. La versi\u00f3n 0.202.10 contiene un parche para el problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/nocodb/nocodb/security/advisories/GHSA-qg73-g3cf-vhhh",
"source": "security-advisories@github.com"
}
]
}