Lucene search

K
cveGitHub_MCVE-2024-34710
HistoryMay 20, 2024 - 10:15 p.m.

CVE-2024-34710

2024-05-2022:15:08
CWE-1336
GitHub_M
web.nvd.nist.gov
36
wiki.js
node.js
client side template
injection
vulnerability
cve-2024-34710
malicious javascript
content section
payload
html tag
fixed

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

9.0%

Wiki.js is al wiki app built on Node.js. Client side template injection was discovered, that could allow an attacker to inject malicious JavaScript into the content section of pages that would execute once a victim loads the page that contains the payload. This was possible through the injection of a invalid HTML tag with a template injection payload on the next line. This vulnerability is fixed in 2.5.303.

Affected configurations

Vulners
Vulnrichment
Node
requarkswikiRange2.5.302
VendorProductVersionCPE
requarkswiki*cpe:2.3:a:requarks:wiki:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "requarks",
    "product": "wiki",
    "versions": [
      {
        "version": "<= 2.5.302",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

9.0%

Related for CVE-2024-34710