Lucene search

K
cve[email protected]CVE-2022-4527
HistoryDec 15, 2022 - 9:15 p.m.

CVE-2022-4527

2022-12-1521:15:13
CWE-79
web.nvd.nist.gov
80
cve-2022-4527
vulnerability
collective.task
cross site scripting
remote attack
upgrade
patch
vdb-215907
nvd

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

30.6%

A vulnerability was found in collective.task up to 3.0.8. It has been classified as problematic. This affects the function renderCell/AssignedGroupColumn of the file src/collective/task/browser/table.py. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 3.0.9 is able to address this issue. The name of the patch is 1aac7f83fa2c2b41d59ba02748912953461f3fac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215907.

Affected configurations

Vulners
NVD
Node
collective.task_projectcollective.taskMatch3.0.0
OR
collective.task_projectcollective.taskMatch3.0.1
OR
collective.task_projectcollective.taskMatch3.0.2
OR
collective.task_projectcollective.taskMatch3.0.3
OR
collective.task_projectcollective.taskMatch3.0.4
OR
collective.task_projectcollective.taskMatch3.0.5
OR
collective.task_projectcollective.taskMatch3.0.6
OR
collective.task_projectcollective.taskMatch3.0.7
OR
collective.task_projectcollective.taskMatch3.0.8
VendorProductVersionCPE
collective\.task_projectcollective\.task3.0.0cpe:2.3:a:collective\.task_project:collective\.task:3.0.0:*:*:*:*:*:*:*
collective\.task_projectcollective\.task3.0.1cpe:2.3:a:collective\.task_project:collective\.task:3.0.1:*:*:*:*:*:*:*
collective\.task_projectcollective\.task3.0.2cpe:2.3:a:collective\.task_project:collective\.task:3.0.2:*:*:*:*:*:*:*
collective\.task_projectcollective\.task3.0.3cpe:2.3:a:collective\.task_project:collective\.task:3.0.3:*:*:*:*:*:*:*
collective\.task_projectcollective\.task3.0.4cpe:2.3:a:collective\.task_project:collective\.task:3.0.4:*:*:*:*:*:*:*
collective\.task_projectcollective\.task3.0.5cpe:2.3:a:collective\.task_project:collective\.task:3.0.5:*:*:*:*:*:*:*
collective\.task_projectcollective\.task3.0.6cpe:2.3:a:collective\.task_project:collective\.task:3.0.6:*:*:*:*:*:*:*
collective\.task_projectcollective\.task3.0.7cpe:2.3:a:collective\.task_project:collective\.task:3.0.7:*:*:*:*:*:*:*
collective\.task_projectcollective\.task3.0.8cpe:2.3:a:collective\.task_project:collective\.task:3.0.8:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "collective.task",
    "versions": [
      {
        "version": "3.0.0",
        "status": "affected"
      },
      {
        "version": "3.0.1",
        "status": "affected"
      },
      {
        "version": "3.0.2",
        "status": "affected"
      },
      {
        "version": "3.0.3",
        "status": "affected"
      },
      {
        "version": "3.0.4",
        "status": "affected"
      },
      {
        "version": "3.0.5",
        "status": "affected"
      },
      {
        "version": "3.0.6",
        "status": "affected"
      },
      {
        "version": "3.0.7",
        "status": "affected"
      },
      {
        "version": "3.0.8",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

30.6%