CVE-2023-49469

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-49469
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-49469.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-49469
Related
Published
2023-12-28T06:15:44Z
Modified
2025-07-02T00:28:46.217735Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Reflected Cross Site Scripting (XSS) vulnerability in Shaarli v0.12.2, allows remote attackers to execute arbitrary code via search tag function.

References

Affected packages

Debian:12 / shaarli

Package

Name
shaarli
Purl
pkg:deb/debian/shaarli?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.12.1+dfsg-8
0.13.0+dfsg-1
0.13.0+dfsg-2
0.13.0+dfsg-3
0.13.0+dfsg-4
0.13.0+dfsg-5
0.14.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / shaarli

Package

Name
shaarli
Purl
pkg:deb/debian/shaarli?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13.0+dfsg-1

Affected versions

0.*

0.12.1+dfsg-8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/shaarli/shaarli

Affected ranges

Type
GIT
Repo
https://github.com/shaarli/shaarli
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.5.3

Other

help

v0.*

v0.0.40beta
v0.0.41beta
v0.0.42beta
v0.0.43beta
v0.0.44beta
v0.0.45beta
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.5.4
v0.6.0
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.6.5
v0.7.0
v0.8.0
v0.8.1