mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
64 lines
2.6 KiB
JSON
64 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-29182",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-04-04T15:15:38.847",
|
|
"lastModified": "2024-11-21T09:07:44.747",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Collabora Online is a collaborative online office suite based on LibreOffice. A stored cross-site scripting vulnerability was found in Collabora Online. An attacker could create a document with an XSS payload in document text referenced by field which, if hovered over to produce a tooltip, could be executed by the user's browser. Users should upgrade to Collabora Online 23.05.10.1 or higher. Earlier series of Collabora Online, 22.04, 21.11, etc. are unaffected."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Collabora Online es una suite ofim\u00e1tica colaborativa en l\u00ednea basada en LibreOffice. Se encontr\u00f3 una vulnerabilidad de Cross-Site Scripting almacenada en Collabora Online. Un atacante podr\u00eda crear un documento con un payload XSS en el texto del documento al que se hace referencia por campo que, si se pasa por encima para generar informaci\u00f3n sobre herramientas, podr\u00eda ser ejecutado por el navegador del usuario. Los usuarios deben actualizar a Collabora Online 23.05.10.1 o superior. Las series anteriores de Collabora Online, 22.04, 21.11, etc. no se ven afectadas."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-9gmw-5q2c-4398",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-9gmw-5q2c-4398",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |