Lucene search

K
githubGitHub Advisory DatabaseGHSA-RJW8-V7RR-R563
HistoryJun 26, 2024 - 2:08 p.m.

October System module has a Reflected XSS via X-October-Request-Handler Header

2024-06-2614:08:31
CWE-79
GitHub Advisory Database
github.com
4
october system
reflected xss
x-october-request-handler header
ajax handler
html
patch
v3.5.15

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0

Percentile

9.1%

Impact

The X-October-Request-Handler Header does not sanitize the AJAX handler name and allows unescaped HTML to be reflected back. There is no impact since this vulnerability cannot be exploited through normal browser interactions. This unescaped value is only detectable when using a proxy interception tool.

Patches

This issue has been patched in v3.5.15.

References

Credits to:

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
octobersystemRange3.23.5.15
VendorProductVersionCPE
octobersystem*cpe:2.3:a:october:system:*:*:*:*:*:*:*:*

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0

Percentile

9.1%

Related for GHSA-RJW8-V7RR-R563