Security
Headlines
HeadlinesLatestCVEs

Tag

#xss

GHSA-f454-jm6x-56q6: Cross-site Scripting in Zenario

Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via News articles.

ghsa
#xss#git
Revenue Collection System 1.0 Cross Site Scripting / Authentication Bypass

Revenue Collection System version 1.0 suffers from a persistent cross site scripting vulnerability allowing an authenticated client user to add an administrative user account to the application then log in as the newly created admin.

CVE-2022-44069: Stored XSS in Nest library · Issue #4 · hieuminhnv/Zenario-CMS-last-version

Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via the Nest library module.

CVE-2022-44071: Stored XSS in profile · Issue #5 · hieuminhnv/Zenario-CMS-last-version

Zenario CMS 9.3.57186 is is vulnerable to Cross Site Scripting (XSS) via profile.

CVE-2022-44070: Stored XSS in News articles · Issue #3 · hieuminhnv/Zenario-CMS-last-version

Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via News articles.

CVE-2022-43264: Guitar Pro Directory Traversal and Filename XSS

Arobas Music Guitar Pro for iPad and iPhone before v1.10.2 allows attackers to perform directory traversal and download arbitrary files via a crafted web request.

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

CVE-2022-4022: Diff [2672900:2776612] for svg-support/trunk – WordPress Plugin Repository

The SVG Support plugin for WordPress defaults to insecure settings in version 2.5 and 2.5.1. SVG files containing malicious javascript are not sanitized. While version 2.5 adds the ability to sanitize image as they are uploaded, the plugin defaults to disable sanitization and does not restrict SVG upload to only administrators. This allows authenticated attackers, with author-level privileges and higher, to upload malicious SVG files that can be embedded in posts and pages by higher privileged users. Additionally, the embedded JavaScript is also triggered on visiting the image URL, which allows an attacker to execute malicious code in browsers visiting that URL.

GHSA-xx6g-jj35-pxjv: Cross Site Scripting vulnerability in wsgidav when directory browsing is enabled

### Impact Implementations using this library with directory browsing enabled may be susceptible to [Cross Site Scripting (XSS)](https://owasp.org/www-community/attacks/xss/) attacks. ### Patches Users can upgrade to v4.1.0 ### Workarounds Set `dir_browser.enable = False` in the configuration. For instance, when using a Python dictionary to configure the library: ``` config = { # your normal configuration "dir_browser": { "enable": False }, } app = WsgiDAVApp(config) ``` ### For more information Note that an attacker cannot exploit this vulnerability, by simply uploading a file or folder with a manipulated file name. However if the WsgiDAV library is used in a scenario where untrusted data is displayed in the directory browser's user interface (e.g. 'realm' or user name, ...) XSS may happen. If you have any questions or comments about this advisory: * Open an issue in [mar10/wsgidav](https://github.com/mar10/wsgidav/) * See the [security policy](https://github....