CVE-2022-21649

Convos is an open source multi-user chat that runs in a web browser. Characters starting with "https://" in the chat window create an <a> tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for "<" or ">" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:convos:convos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:45

Type Values Removed Values Added
CVSS v2 : 3.5
v3 : 5.4
v2 : 3.5
v3 : 7.6
References () https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability - Broken Link, Third Party Advisory () https://blog.pocas.kr/2021/12/30/2021-12-30-s-xss-convos-chat/#Second-vulnerability - Broken Link, Third Party Advisory
References () https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c - Patch, Third Party Advisory () https://github.com/convos-chat/convos/commit/86b2193de375005ba71d9dd53843562c6ac1847c - Patch, Third Party Advisory
References () https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7 - Patch, Third Party Advisory () https://github.com/convos-chat/convos/security/advisories/GHSA-xmpj-xwm3-vww7 - Patch, Third Party Advisory
References () https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/ - Exploit, Patch, Third Party Advisory () https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/ - Exploit, Patch, Third Party Advisory

Information

Published : 2022-01-04 21:15

Updated : 2024-11-21 06:45


NVD link : CVE-2022-21649

Mitre link : CVE-2022-21649

CVE.ORG link : CVE-2022-21649


JSON object : View

Products Affected

convos

  • convos
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')