CVE-2018-1000665

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1000665
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000665.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-1000665
Aliases
Related
Published
2018-09-06T17:29:01Z
Modified
2024-09-03T02:01:33.888656Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in unit.html and testsDOH/base/loader/i18n-exhaustive/i18n-test/unit.html and testsDOH/base/i18nExhaustive.js in the DOH that can result in Victim attacked through their browser - deliver malware, steal HTTP cookies, bypass CORS trust. This attack appear to be exploitable via Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. This vulnerability appears to have been fixed in 1.14.

References

Affected packages

Debian:11 / dojo

Package

Name
dojo
Purl
pkg:deb/debian/dojo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.1+dfsg1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / dojo

Package

Name
dojo
Purl
pkg:deb/debian/dojo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.1+dfsg1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / dojo

Package

Name
dojo
Purl
pkg:deb/debian/dojo?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.1+dfsg1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Git / github.com/dojo/dojo

Affected ranges

Type
GIT
Repo
https://github.com/dojo/dojo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.10.0
1.10.0-beta1
1.10.0-rc1
1.11.0
1.11.0-rc1
1.11.0-rc2
1.11.0-rc3
1.11.0-rc4
1.11.0-rc5
1.12.0
1.12.0-rc1
1.12.0-rc2
1.12.0-rc3
1.12.0-rc4
1.13.0