JmPotato Pomash editor.html article.title/content.title/article.tag Cross Site Scripting

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin JmPotato Pomash. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, Pomash/theme/clean/templates/editor.html na cikin fayil, $software_component na cikin sashi. Ngam manipulation of the argument article.title/content.title/article.tag shi Cross Site Scripting. CWE shidin ka a yi bayani matsala sai ya kai CWE-79. Gaskiya, laifi an fitar da shi 12/28/2022 a matsayin be1914ef0a6808e00f51618b2de92496a3604415. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2018-25051. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal bayani ga. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $0-$5k. Patch ɗin sunan ganowa shine be1914ef0a6808e00f51618b2de92496a3604415. Gyaran matsalar yana nan a shirye don saukewa a github.com. Ana so a yi patch don gyara wannan matsala. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

3 Goyarwa · 64 Datenpunkte

FurɗeSúgá
12/28/2022 12:22
Gargadi 1/2
01/25/2023 15:36
Gargadi 2/2
01/25/2023 15:42
software_vendorJmPotatoJmPotatoJmPotato
software_namePomashPomashPomash
software_filePomash/theme/clean/templates/editor.htmlPomash/theme/clean/templates/editor.htmlPomash/theme/clean/templates/editor.html
software_argumentarticle.title/content.title/article.tagarticle.title/content.title/article.tagarticle.title/content.title/article.tag
vulnerability_cweCWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)
vulnerability_risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prHHH
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_identifierbe1914ef0a6808e00f51618b2de92496a3604415be1914ef0a6808e00f51618b2de92496a3604415be1914ef0a6808e00f51618b2de92496a3604415
advisory_urlhttps://github.com/JmPotato/Pomash/commit/be1914ef0a6808e00f51618b2de92496a3604415https://github.com/JmPotato/Pomash/commit/be1914ef0a6808e00f51618b2de92496a3604415https://github.com/JmPotato/Pomash/commit/be1914ef0a6808e00f51618b2de92496a3604415
countermeasure_nameKariKariKari
patch_namebe1914ef0a6808e00f51618b2de92496a3604415be1914ef0a6808e00f51618b2de92496a3604415be1914ef0a6808e00f51618b2de92496a3604415
countermeasure_patch_urlhttps://github.com/JmPotato/Pomash/commit/be1914ef0a6808e00f51618b2de92496a3604415https://github.com/JmPotato/Pomash/commit/be1914ef0a6808e00f51618b2de92496a3604415https://github.com/JmPotato/Pomash/commit/be1914ef0a6808e00f51618b2de92496a3604415
source_cveCVE-2018-25051CVE-2018-25051CVE-2018-25051
cna_responsibleVulDBVulDBVulDB
advisory_date1672182000 (12/28/2022)1672182000 (12/28/2022)1672182000 (12/28/2022)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auMMM
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_eNDNDND
cvss3_vuldb_eXXX
cvss2_vuldb_basescore3.33.33.3
cvss2_vuldb_tempscore2.92.92.9
cvss3_vuldb_basescore2.42.42.4
cvss3_vuldb_tempscore2.32.32.3
cvss3_meta_basescore2.42.43.6
cvss3_meta_tempscore2.32.33.6
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1672182000 (12/28/2022)1672182000 (12/28/2022)
cve_nvd_summaryA vulnerability, which was classified as problematic, was found in JmPotato Pomash. This affects an unknown part of the file Pomash/theme/clean/templates/editor.html. The manipulation of the argument article.title/content.title/article.tag leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be1914ef0a6808e00f51618b2de92496a3604415. It is recommended to apply a patch to fix this issue. The identifier VDB-216957 was assigned to this vulnerability.A vulnerability, which was classified as problematic, was found in JmPotato Pomash. This affects an unknown part of the file Pomash/theme/clean/templates/editor.html. The manipulation of the argument article.title/content.title/article.tag leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be1914ef0a6808e00f51618b2de92496a3604415. It is recommended to apply a patch to fix this issue. The identifier VDB-216957 was assigned to this vulnerability.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prH
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cve_cnaVulDB
cvss3_nvd_basescore6.1
cvss3_cna_basescore2.4

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!