CVE-2024-38521

Hush Line is a free and open-source, anonymous-tip-line-as-a-service for organizations or individuals. There is a stored XSS in the Inbox. The input is displayed using the `safe` Jinja2 attribute, and thus not sanitized upon display. This issue has been patched in version 0.1.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:hushline:hush_line:*:*:*:*:*:*:*:*

History

17 Sep 2024, 19:06

Type Values Removed Values Added
References () https://github.com/scidsg/hushline/security/advisories/GHSA-4v8c-r6h2-fhh3 - () https://github.com/scidsg/hushline/security/advisories/GHSA-4v8c-r6h2-fhh3 - Exploit, Third Party Advisory
CPE cpe:2.3:a:hushline:hush_line:*:*:*:*:*:*:*:*
First Time Hushline
Hushline hush Line
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 6.1

01 Jul 2024, 12:37

Type Values Removed Values Added
Summary
  • (es) Hush Line es una línea de sugerencias anónimas como servicio, gratuita y de código abierto para organizaciones o individuos. Hay un XSS almacenado en la Bandeja de entrada. La entrada se muestra utilizando el atributo Jinja2 "seguro" y, por lo tanto, no se sanitiza al mostrarse. Este problema se solucionó en la versión 0.1.0.

28 Jun 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-28 16:15

Updated : 2024-09-17 19:06


NVD link : CVE-2024-38521

Mitre link : CVE-2024-38521

CVE.ORG link : CVE-2024-38521


JSON object : View

Products Affected

hushline

  • hush_line
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')