2024-04-04 08:46:00 +00:00

116 lines
4.6 KiB
JSON

{
"id": "CVE-2022-41938",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-19T01:15:10.383",
"lastModified": "2022-11-26T03:19:52.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Flarum is an open source discussion platform. Flarum's page title system allowed for page titles to be converted into HTML DOM nodes when pages were rendered. The change was made after `v1.5` and was not noticed. This allowed an attacker to inject malicious HTML markup using a discussion title input, either by creating a new discussion or renaming one. The XSS attack occurs after a visitor opens the relevant discussion page. All communities running Flarum from `v1.5.0` to `v1.6.1` are impacted. The vulnerability has been fixed and published as flarum/core `v1.6.2`. All communities running Flarum from `v1.5.0` to `v1.6.1` have to upgrade as soon as possible to v1.6.2. There are no known workarounds for this issue."
},
{
"lang": "es",
"value": "Flarum es una plataforma de debate de c\u00f3digo abierto. El sistema de t\u00edtulos de p\u00e1ginas de Flarum permit\u00eda que los t\u00edtulos de las p\u00e1ginas se convirtieran en nodos HTML DOM cuando se representaban las p\u00e1ginas. El cambio se realiz\u00f3 despu\u00e9s de la \"v1.5\" y no se not\u00f3. Esto permiti\u00f3 a un atacante inyectar etiquetas HTML maliciosas utilizando una entrada de t\u00edtulo de discusi\u00f3n, ya sea creando una nueva discusi\u00f3n o cambiando el nombre de una. El ataque XSS ocurre despu\u00e9s de que un visitante abre la p\u00e1gina de discusi\u00f3n correspondiente. Todas las comunidades que ejecutan Flarum desde `v1.5.0` hasta `v1.6.1` se ven afectadas. La vulnerabilidad ha sido reparada y publicada como flarum/core `v1.6.2`. Todas las comunidades que ejecutan Flarum desde `v1.5.0` hasta `v1.6.1` deben actualizar lo antes posible a v1.6.2. No se conocen workarounds para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flarum:flarum:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.5.0",
"versionEndExcluding": "1.6.2",
"matchCriteriaId": "1CB7BB87-17F3-4F63-B744-69CB036BA93E"
}
]
}
]
}
],
"references": [
{
"url": "https://discuss.flarum.org/d/27558",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/flarum/framework/commit/690de9ce0ffe7ac4d45b73e303f44340c3433138",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/flarum/framework/security/advisories/GHSA-7x4w-j98p-854x",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}