Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-34710
HistoryMay 20, 2024 - 9:59 p.m.

CVE-2024-34710 Wiki.js Stored XSS through Client Side Template Injection

2024-05-2021:59:16
CWE-1336
GitHub_M
github.com
2
wiki.js
stored xss
client side template injection
javascript
node.js
vulnerability
version 2.5.303

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Wiki.js is al wiki app built on Node.js. Client side template injection was discovered, that could allow an attacker to inject malicious JavaScript into the content section of pages that would execute once a victim loads the page that contains the payload. This was possible through the injection of a invalid HTML tag with a template injection payload on the next line. This vulnerability is fixed in 2.5.303.

CNA Affected

[
  {
    "vendor": "requarks",
    "product": "wiki",
    "versions": [
      {
        "version": "<= 2.5.302",
        "status": "affected"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-34710