Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-44AAE9F823FE297072E36365F34D76C7
HistoryJun 16, 2014 - 12:00 a.m.

XSS Vulnerability in Djblets json_dumps()

2014-06-1600:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
12

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

61.1%

Django’s JSON serialization does not handle escaping of any characters to make them safe for injecting into HTML. This allows an attacker who can provide part of a JSON-serializable object to craft a string that can break out of a <script> tag and create its own, injecting a custom script.

Affected configurations

Vulners
Node
pypiwatertoolsRange<0.7.30pypi
OR
pypiwatertoolsRange0.8.0>pypi
OR
pypiwatertoolsRange<0.8.3pypi

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

61.1%

Related for GITLAB-44AAE9F823FE297072E36365F34D76C7