Jumpserver 2.10.0 <= version <= 2.26.0 contains multiple stored XSS vulnerabilities because of improper filtering of user input, which can execute any javascript under admin's permission.
References
Configurations
History
21 Nov 2024, 07:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/bybit-sec/eb750c1d906c89e97092b29015472738 - Exploit, Third Party Advisory | |
References | () https://github.com/jumpserver/lina/blob/v2.10.0/src/views/settings/SystemMessageSubscription/SelectDialog.vue#L43 - Exploit | |
References | () https://github.com/jumpserver/lina/blob/v2.11.0/src/layout/components/NavHeader/SiteMessages.vue#L40 - Exploit | |
References | () https://github.com/jumpserver/lina/blob/v2.26.0/src/views/tickets/components/Comments.vue#L16 - Exploit | |
References | () https://github.com/jumpserver/lina/pull/2264 - Patch |
01 Jun 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fit2cloud
Fit2cloud lina |
|
References | (MISC) https://github.com/jumpserver/lina/pull/2264 - Patch | |
References | (MISC) https://gist.github.com/bybit-sec/eb750c1d906c89e97092b29015472738 - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/jumpserver/lina/blob/v2.26.0/src/views/tickets/components/Comments.vue#L16 - Exploit | |
References | (MISC) https://github.com/jumpserver/lina/blob/v2.10.0/src/views/settings/SystemMessageSubscription/SelectDialog.vue#L43 - Exploit | |
References | (MISC) https://github.com/jumpserver/lina/blob/v2.11.0/src/layout/components/NavHeader/SiteMessages.vue#L40 - Exploit | |
CPE | cpe:2.3:a:fit2cloud:lina:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CWE | CWE-79 |
01 Jun 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-05-24 20:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-42225
Mitre link : CVE-2022-42225
CVE.ORG link : CVE-2022-42225
JSON object : View
Products Affected
fit2cloud
- lina
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')