mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
60 lines
2.3 KiB
JSON
60 lines
2.3 KiB
JSON
{
|
|
"id": "CVE-2024-54001",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-12-05T16:15:26.650",
|
|
"lastModified": "2024-12-05T16:15:26.650",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Kanboard is project management software that focuses on the Kanban methodology. HTML can be injected and stored into the application settings section. The fields application_language, application_date_format,application_timezone and application_time_format allow arbirary user input which is reflected. The vulnerability can become xss if the user input is javascript code that bypass CSP. This vulnerability is fixed in 1.2.41."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Kanboard es un software de gesti\u00f3n de proyectos que se centra en la metodolog\u00eda Kanban. Se puede inyectar y almacenar HTML en la secci\u00f3n de configuraci\u00f3n de la aplicaci\u00f3n. Los campos application_language, application_date_format,application_timezone y application_time_format permiten la entrada arbitraria del usuario, que se refleja. La vulnerabilidad puede convertirse en xss si la entrada del usuario es c\u00f3digo javascript que omite CSP. Esta vulnerabilidad se solucion\u00f3 en 1.2.41."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
|
"baseScore": 5.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-80"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-4vvp-jf72-chrj",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |