No edit summary |
No edit summary Tag: 2017 source edit |
||
Line 8: | Line 8: | ||
|- | |- | ||
|Severity | |Severity | ||
| | |Low | ||
|- | |- | ||
|Affected | |Affected | ||
Line 19: | Line 19: | ||
| | | | ||
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789] | * [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789] | ||
* [https://www.cve.org/CVERecord?id=CVE-2022- | * [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814] | ||
* [https://www.cve.org/CVERecord?id=CVE-2022- | * [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000] | ||
|} | |} | ||
Revision as of 16:40, 11 November 2022
Date | 2022-11-08 |
Severity | Low |
Affected | BlueSpice 4.x |
Fixed in | BlueSpice 4.2.1 |
CVE |
Problem
Logged in users are able to inject arbitrary HTML (XSS) into several locations in the main interface by editing their user preferences.
Solution
Upgrade to BlueSpice 4.2.1
Acknowledgements
Found during an internal security audit.