2024-12-08 03:06:42 +00:00

147 lines
4.2 KiB
JSON

{
"id": "CVE-2023-24065",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-29T22:15:09.047",
"lastModified": "2024-11-21T07:47:21.830",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for health charting."
},
{
"lang": "es",
"value": "NOSH 4a5cfdb permite almacenar XSS a trav\u00e9s de la p\u00e1gina de creaci\u00f3n de usuario. Por ejemplo, un nombre (de un m\u00e9dico, asistente o usuario de facturaci\u00f3n) puede tener una carga \u00fatil de JavaScript que se ejecuta al visitar la p\u00e1gina /users/2/1. Esto puede permitir a los atacantes robar informaci\u00f3n m\u00e9dica protegida porque el producto es para gr\u00e1ficos de salud."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nosh_chartingsystem_project:nosh_chartingsystem:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180704D4-8A66-4502-9485-38392FE11B2D"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/abbisQQ/e0967d5b8355087c8e224bdd1ace3bf3",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/shihjay2/docker-nosh",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/shihjay2/nosh2/issues/202",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/shihjay2/nosh2/tree/4a5cfdbd73f6a2ab5ee43a33d173c46fe0271533",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://noshemr.wordpress.com",
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/abbisQQ/e0967d5b8355087c8e224bdd1ace3bf3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/shihjay2/docker-nosh",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/shihjay2/nosh2/issues/202",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/shihjay2/nosh2/tree/4a5cfdbd73f6a2ab5ee43a33d173c46fe0271533",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://noshemr.wordpress.com",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
]
}
]
}