A vulnerability classified as problematic has been found in eXo Chat Application. Affected is an unknown function of the file application/src/main/webapp/vue-app/components/ExoChatMessageComposer.vue of the component Mention Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 3.3.0-20220417 is able to address this issue. The name of the patch is 26bf307d3658d1403cfd5c3ad423ce4c4d1cb2dc. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-220212.
References
Link | Resource |
---|---|
https://community.exoplatform.com/portal/dw/tasks/taskDetail/56304 | Permissions Required Vendor Advisory |
https://github.com/exoplatform/chat-application/commit/26bf307d3658d1403cfd5c3ad423ce4c4d1cb2dc | Patch Third Party Advisory |
https://github.com/exoplatform/chat-application/pull/485 | Patch Third Party Advisory |
https://github.com/exoplatform/chat-application/releases/tag/3.3.0-20220417 | Third Party Advisory |
https://vuldb.com/?ctiid.220212 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.220212 | Permissions Required Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-02-06 19:15
Updated : 2024-05-17 02:17
NVD link : CVE-2022-4902
Mitre link : CVE-2022-4902
CVE.ORG link : CVE-2022-4902
JSON object : View
Products Affected
exoplatform
- chat_application
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')