Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5.
References
Configurations
History
21 Nov 2024, 05:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.galette.eu/issues/1535 - Permissions Required, Vendor Advisory | |
References | () https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6 - Patch, Third Party Advisory | |
References | () https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5 - Patch, Third Party Advisory | |
References | () https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995 - Patch, Third Party Advisory | |
References | () https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 6.8 |
Information
Published : 2021-10-25 16:15
Updated : 2024-11-21 05:48
NVD link : CVE-2021-21319
Mitre link : CVE-2021-21319
CVE.ORG link : CVE-2021-21319
JSON object : View
Products Affected
galette
- galette
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')