Lucene search

K
cve[email protected]CVE-2022-4942
HistoryApr 20, 2023 - 6:15 a.m.

CVE-2022-4942

2023-04-2006:15:07
CWE-79
web.nvd.nist.gov
16
vulnerability
mportuga
eslint-detailed-reporter
cross-site scripting
patch
vdb-226310
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

37.5%

A vulnerability was found in mportuga eslint-detailed-reporter up to 0.9.0 and classified as problematic. Affected by this issue is the function renderIssue in the library lib/template-generator.js. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The patch is identified as 505c190efd4905990db6207863bdcbd9b1d7e1bd. It is recommended to apply a patch to fix this issue. VDB-226310 is the identifier assigned to this vulnerability.

Affected configurations

Vulners
NVD
Node
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.1
OR
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.2
OR
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.3
OR
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.4
OR
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.5
OR
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.6
OR
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.7
OR
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.8
OR
mportugaeslint-detailed-reporter_project_eslint-detailed-reporterMatch0.9

CNA Affected

[
  {
    "vendor": "mportuga",
    "product": "eslint-detailed-reporter",
    "versions": [
      {
        "version": "0.1",
        "status": "affected"
      },
      {
        "version": "0.2",
        "status": "affected"
      },
      {
        "version": "0.3",
        "status": "affected"
      },
      {
        "version": "0.4",
        "status": "affected"
      },
      {
        "version": "0.5",
        "status": "affected"
      },
      {
        "version": "0.6",
        "status": "affected"
      },
      {
        "version": "0.7",
        "status": "affected"
      },
      {
        "version": "0.8",
        "status": "affected"
      },
      {
        "version": "0.9",
        "status": "affected"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

37.5%