Lucene search

K
cve[email protected]CVE-2023-26123
HistoryApr 14, 2023 - 5:15 a.m.

CVE-2023-26123

2023-04-1405:15:13
CWE-79
web.nvd.nist.gov
9
information security
vulnerability
raysan5
raylib
cross-site scripting
xss
nvd
cve-2023-26123

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

46.6%

Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ’ character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function.

Note: This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected.

Affected configurations

NVD
Node
raylibraylibRange<4.5.0
CPENameOperatorVersion
raylib:raylibrayliblt4.5.0

CNA Affected

[
  {
    "product": "raysan5/raylib",
    "versions": [
      {
        "version": "0",
        "lessThan": "4.5.0",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "vendor": "n/a"
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

46.6%

Related for CVE-2023-26123