2023-10-10 20:00:29 +00:00

114 lines
4.1 KiB
JSON

{
"id": "CVE-2023-42808",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-04T20:15:10.187",
"lastModified": "2023-10-10T18:31:06.820",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Common Voice is the web app for Mozilla Common Voice, a platform for collecting speech donations in order to create public domain datasets for training voice recognition-related tools. Version 1.88.2 is vulnerable to reflected Cross-Site Scripting given that user-controlled data flows to a path expression (path of a network request). This issue may lead to reflected Cross-Site Scripting (XSS) in the context of Common Voice\u2019s server origin. As of time of publication, it is unknown whether any patches or workarounds exist."
},
{
"lang": "es",
"value": "Common Voice es la aplicaci\u00f3n web de Mozilla Common Voice, una plataforma para recopilar donaciones de voz con el fin de crear conjuntos de datos de dominio p\u00fablico para entrenar herramientas relacionadas con el reconocimiento de voz. La versi\u00f3n 1.88.2 es vulnerable a Cross-Site Scripting (XSS) dado que los datos controlados por el usuario fluyen a una expresi\u00f3n de ruta (ruta de una solicitud de red). Este problema puede llevar a un Cross-Site Scripting (XSS) en el contexto del origen del servidor de Common Voice. Al momento de la publicaci\u00f3n, se desconoce si existen parches o workarounds."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:common_voice:1.88.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2A66FB18-1AD2-4C35-BB29-953F8B8A77EB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mozilla/common-voice/blob/9d6ffd755e29b81918b86b9f5218b9c27d9c1c1a/server/src/fetch-legal-document.ts#LL21-L62C2",
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/mozilla/common-voice/blob/9d6ffd755e29b81918b86b9f5218b9c27d9c1c1a/server/src/server.ts#L214",
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}