Smashing 1.3.4 is vulnerable to Cross Site Scripting (XSS). A URL for a widget can be crafted and used to execute JavaScript on the victim's computer. The JavaScript code can then steal data available in the session/cookies depending on the user environment (e.g. if re-using internal URL's for deploying, or cookies that are very permissive) private information may be retrieved by the attacker.
References
Link | Resource |
---|---|
https://github.com/Smashing/smashing/blob/ad7325f159f89854ca4e7d94e7be9bee507b6d46/CHANGELOG.md | Release Notes Third Party Advisory |
https://github.com/Smashing/smashing/pull/186 | Patch Third Party Advisory |
https://github.com/Smashing/smashing/pull/186#issuecomment-871727614 | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-07-06 15:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-35440
Mitre link : CVE-2021-35440
CVE.ORG link : CVE-2021-35440
JSON object : View
Products Affected
smashing_project
- smashing
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')