2024-12-08 03:06:42 +00:00

118 lines
4.8 KiB
JSON

{
"id": "CVE-2024-43412",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T17:15:14.680",
"lastModified": "2024-09-12T20:20:56.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute arbitrary JavaScript via the file preview function. Users can upload HTML/CSS/JS files into the Xibo Library via the Generic File module to be referenced on Displays and in Layouts. This is intended functionality. When previewing these resources from the Library and Layout editor they are executed in the users browser. This will be disabled in future releases, and users are encouraged to use the new developer tools in 4.1 to design their widgets which require this type of functionality. This behavior has been changed in 4.1.0 to preview previewing of generic files. There are no workarounds for this issue."
},
{
"lang": "es",
"value": "Xibo es una plataforma de se\u00f1alizaci\u00f3n digital de c\u00f3digo abierto con un sistema de gesti\u00f3n de contenido web (CMS). Antes de la versi\u00f3n 4.1.0, una vulnerabilidad de cross-site scripting en Xibo CMS permit\u00eda a los usuarios autorizados ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s de la funci\u00f3n de vista previa de archivos. Los usuarios pueden cargar archivos HTML/CSS/JS en la librer\u00eda Xibo a trav\u00e9s del m\u00f3dulo Archivo gen\u00e9rico para que se haga referencia a ellos en las pantallas y en los dise\u00f1os. Esta es una funcionalidad prevista. Al obtener una vista previa de estos recursos desde la librer\u00eda y el editor de dise\u00f1os, se ejecutan en el navegador del usuario. Esta funci\u00f3n se desactivar\u00e1 en futuras versiones y se recomienda a los usuarios que utilicen las nuevas herramientas para desarrolladores en la versi\u00f3n 4.1 para dise\u00f1ar sus widgets que requieran este tipo de funcionalidad. Este comportamiento se ha modificado en la versi\u00f3n 4.1.0 para obtener una vista previa de los archivos gen\u00e9ricos. No existen workarounds para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.1.0",
"matchCriteriaId": "1BC12422-D4CD-4752-BF9A-8E5956BEBCC1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xibosignage/xibo-cms/commit/d8f13339469d9f19ce591fb2bd7c9e0e0d2da118",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-336f-wrgx-57gg",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}