Lucene search

K
githubGitHub Advisory DatabaseGHSA-VWHG-JWR4-VXGG
HistoryAug 15, 2024 - 6:06 p.m.

gettext.js has a Cross-site Scripting injection

2024-08-1518:06:50
CWE-79
GitHub Advisory Database
github.com
5
xss injection
update
gettext.js
vulnerability
dictionary files
origin control
plural forms
software

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

AI Score

6.1

Confidence

High

EPSS

0

Percentile

9.5%

Impact

Possible vulnerability to XSS injection if .po dictionary definition files is corrupted

Patches

Update gettext.js to 2.0.3

Workarounds

Make sure you control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.

Affected configurations

Vulners
Node
gettext.jsRange<2.0.3
VendorProductVersionCPE
*gettext.js*cpe:2.3:a:*:gettext.js:*:*:*:*:*:*:*:*

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

AI Score

6.1

Confidence

High

EPSS

0

Percentile

9.5%