This issue has been patched in version 7.3.0. In the worst case, this can lead to arbitrary code execution on the server, because admins can create Server Shell Executors and use them to run any command on the server. It can be used to elevate privileges by targeting admins of a OneDev instance. The exploitation requires the victim to click on an attacker's link. To exploit this issue, attackers need to be able to modify the content of artifacts, which usually means they need to be able to modify a project's build spec. Since all cookies (except for the rememberMe one) do not set the HttpOnly flag, an attacker could steal the session of a victim and use it to impersonate them. When accessing the artifact, the content is rendered by the browser, including any JavaScript that it contains. This leads to Cross-Site Scripting (XSS) when a user creates a build artifact that contains HTML. These artifact files are served by the webserver in the same context as the UI without any further restrictions. They can be accessed through OneDev's web UI after the successful run of a build. During CI/CD builds, it is possible to save build artifacts for later retrieval. Onedev is an open source, self-hosted Git Server with CI/CD and Kanban. Versions prior to 2.3.5 are subject to Cross-site scripting (XSS) vulnerabilities in the SFTPGo WebClient, allowing remote attackers to inject malicious code. There are currently no known workarounds. This issue has been patched, please upgrade to GLPI 10.0.4. External links are not properly sanitized and can therefore be used for a Cross-Site Scripting (XSS) attack. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. GLPI stands for Gestionnaire Libre de Parc Informatique. Versions 7.4.22, 8.0.9, and 8.1.0 contain patches for this issue. KnowageLabs / Knowage-Server starting with the 6.x branch and prior to versions 7.4.22, 8.0.9, and 8.1.0 is vulnerable to cross-site scripting because the `XSSRequestWrapper::stripXSS` method can be bypassed. Knowage is an open source suite for modern business analytics alternative over big data systems. After logging into the sra-admin background, an attacker can upload an html page containing xss attack code in "Personal Center" - "Profile Picture Upload" allowing theft of the user's personal information. sra-admin version 1.1.1 has a storage cross-site scripting (XSS) vulnerability. Sra-admin is a background rights management system that separates the front and back end. Cross-site Scripting (XSS) - Create XSS in task content (when add it). Versions prior to 2.0.3 are vulnerable to Cross-site Scripting. Tasklists is a tasklists plugin for GLPI (Kanban). This could lead to stealing session information and impersonating the affected user. Session hijacking or similar attacks would not be possible.Īn attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, resulting in reflected cross-site scripting attack. A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console under /carbon/mediation_secure_vault/properties/ajaxprocessor.jsp via the name parameter. Session hijacking or similar attacks would not be possible.Īn issue was discovered in WSO2 Enterprise Integrator 6.4.0. A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console under /carbon/ndatasource/validateconnection/ajaxprocessor.jsp via the driver parameter. Cross-Site Request Forgery (CSRF) vulnerability leading to Cross-Site Scripting (XSS) in David Anderson Testimonial Slider plugin Templates service_alias parameter.Īn issue was discovered in WSO2 Enterprise Integrator 6.4.0.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |