ScanCode.io is a server to script and automate software composition analysis pipelines. In the `/license/` endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist. Attackers can exploit this vulnerability to inject malicious scripts into the response generated by the `license_details_view` function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information. This issue has been addressed in release `32.5.2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
History
21 Nov 2024, 08:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | () https://github.com/nexB/scancode.io/blob/dd7769fbc97c84545579cebf1dc4838214098a11/CHANGELOG.rst#v3252-2023-08-14 - Release Notes | |
References | () https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj - Exploit, Vendor Advisory |
21 Aug 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Nexb
Nexb scancode.io |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CPE | cpe:2.3:a:nexb:scancode.io:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/nexB/scancode.io/blob/dd7769fbc97c84545579cebf1dc4838214098a11/CHANGELOG.rst#v3252-2023-08-14 - Release Notes | |
References | (MISC) https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj - Exploit, Vendor Advisory |
14 Aug 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-14 20:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-40024
Mitre link : CVE-2023-40024
CVE.ORG link : CVE-2023-40024
JSON object : View
Products Affected
nexb
- scancode.io
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')