No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
|- | |- | ||
|Date | |Date | ||
|2022- | |2022-04-25 | ||
|- | |- | ||
|Severity | |Severity | ||
Line 11: | Line 11: | ||
|- | |- | ||
|Affected | |Affected | ||
| | |BlueSpice 4.x | ||
|- | |- | ||
|Fixed in | |Fixed in | ||
| | |4.1.3 | ||
|} | |} | ||
== Problem == | == Problem == | ||
Users are able to inject arbitrary HTML (XSS) on | Users are able to inject arbitrary HTML (XSS) on regular pages, using a special value for the <nowiki><code>title</code></nowiki> parameter. This can be triggered via URL. | ||
== Solution == | == Solution == | ||
Upgrade to BlueSpice 4.1. | Upgrade to BlueSpice 4.1.3 | ||
== Acknowledgements == | == Acknowledgements == | ||
Special thanks to the security team of an undisclosed customer | Special thanks to the security team of an undisclosed customer |
Revision as of 16:23, 25 April 2022
Date | 2022-04-25 |
Severity | Medium |
Affected | BlueSpice 4.x |
Fixed in | 4.1.3 |
Problem
Users are able to inject arbitrary HTML (XSS) on regular pages, using a special value for the <code>title</code> parameter. This can be triggered via URL.
Solution
Upgrade to BlueSpice 4.1.3
Acknowledgements
Special thanks to the security team of an undisclosed customer