CVE-2019-13122

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-13122
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-13122.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-13122
Published
2019-07-10T17:15:12Z
Modified
2024-07-31T02:50:12.608913Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A Cross Site Scripting (XSS) vulnerability exists in the template tag used to render message ids in Patchwork v1.1 through v2.1.x. This allows an attacker to insert JavaScript or HTML into the patch detail page via an email sent to a mailing list consumed by Patchwork. This affects the function msgid in templatetags/patch.py. Patchwork versions v2.1.4 and v2.0.4 will contain the fix.

References

Affected packages

Alpine:v3.7 / patchwork

Package

Name
patchwork
Purl
pkg:apk/alpine/patchwork?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.3-r1

Affected versions

1.*

1.1.0-r0
1.1.1-r0
1.1.1-r1
1.1.1-r2
1.1.1-r3
1.1.2-r0
1.1.3-r0

Git / github.com/getpatchwork/patchwork

Affected ranges

Type
GIT
Repo
https://github.com/getpatchwork/patchwork
Events

Affected versions

v1.*

v1.1.0

v2.*

v2.0.0
v2.0.0-rc1
v2.0.0-rc2
v2.0.0-rc3
v2.0.0-rc4
v2.0.1
v2.0.2
v2.0.3