No edit summary |
m (Reverted edits by Margit.link-rodrigue (talk) to last revision by Mglaser) Tag: Rollback |
||
Line 5: | Line 5: | ||
|- | |- | ||
|Date | |Date | ||
|2022- | |2022-01-31 | ||
|- | |- | ||
|Severity | |Severity | ||
Line 11: | Line 11: | ||
|- | |- | ||
|Affected | |Affected | ||
|BlueSpice 4.x | |BlueSpice 3.x, BlueSpice 4.x | ||
|- | |- | ||
|Fixed in | |Fixed in | ||
|4.1. | |BlueSpice 3.2.9, BlueSpice 4.1.1 | ||
|} | |} | ||
== Problem == | == Problem == | ||
Users are able to inject arbitrary HTML (XSS) on | Users are able to inject arbitrary HTML (XSS) on Special:SearchCenter, using the search term. This can be triggered via URL. | ||
== Solution == | == Solution == | ||
Upgrade to BlueSpice 4.1. | Upgrade to BlueSpice 4.1.1 | ||
== Acknowledgements == | == Acknowledgements == | ||
Special thanks to the security team of an undisclosed customer | Special thanks to the security team of an undisclosed customer |
Revision as of 08:16, 26 April 2022
Date | 2022-01-31 |
Severity | Medium |
Affected | BlueSpice 3.x, BlueSpice 4.x |
Fixed in | BlueSpice 3.2.9, BlueSpice 4.1.1 |
Problem
Users are able to inject arbitrary HTML (XSS) on Special:SearchCenter, using the search term. This can be triggered via URL.
Solution
Upgrade to BlueSpice 4.1.1
Acknowledgements
Special thanks to the security team of an undisclosed customer