Part-DB is an open source inventory management system for your electronic components. User input was found not being properly escaped, which allowed malicious users to inject arbitrary HTML into the pages. The Content-Security-Policy forbids inline and external scripts so it is not possible to execute JavaScript code, unless in combination with other vulnerabilities. There are no workarounds, please upgrade to Pat-DB 1.0.2 or later.
References
Configurations
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Part-DB/Part-DB-server/commit/5b7f44f4eaacad8a79bcedec32780e00d7347099 - Patch | |
References | () https://github.com/Part-DB/Part-DB-server/pull/227 - Issue Tracking | |
References | () https://github.com/Part-DB/Part-DB-server/releases/tag/v1.0.2 - Release Notes | |
References | () https://github.com/Part-DB/Part-DB-server/security/advisories/GHSA-9pmh-gmxx-rg2x - Patch, Vendor Advisory |
Information
Published : 2023-02-27 15:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-26042
Mitre link : CVE-2023-26042
CVE.ORG link : CVE-2023-26042
JSON object : View
Products Affected
part-db_project
- part-db
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')