CVE-2024-36819

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-36819
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36819.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36819
Published
2024-06-25T19:15:11Z
Modified
2025-01-15T05:14:22.899015Z
Summary
[none]
Details

MAP-OS 4.45.0 and earlier is vulnerable to Cross-Site Scripting (XSS). This vulnerability allows malicious users to insert a malicious payload into the "Client Name" input. When a service order from this client is created, the malicious payload is displayed on the administrator and employee dashboards, resulting in unauthorized script execution whenever the dashboard is loaded.

References

Affected packages

Git / github.com/ramonsilva20/mapos

Affected ranges

Type
GIT
Repo
https://github.com/ramonsilva20/mapos
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v.*

v.3.15.0

v2.*

v2.6.4

v3.*

v3.1.11
v3.1.5
v3.10.0

Other

v4

v4.*

v4.1.0
v4.1.1
v4.1.2
v4.10.0
v4.11.0
v4.11.1
v4.11.2
v4.12.0
v4.12.1
v4.13.0
v4.13.1
v4.13.2
v4.14.0
v4.14.1
v4.15.0
v4.15.1
v4.16.0
v4.17.0
v4.17.1
v4.18.0
v4.18.1
v4.19.0
v4.2.0
v4.2.1
v4.2.2
v4.20.0
v4.20.1
v4.20.2
v4.21.0
v4.22.0
v4.23.0
v4.24.0
v4.25.0
v4.25.1
v4.26.0
v4.26.2
v4.27.0
v4.28.0
v4.29.0
v4.3
v4.30.0
v4.30.1
v4.30.2
v4.30.3
v4.31.0
v4.31.1
v4.32.0
v4.32.1
v4.33.0
v4.33.1
v4.34.0
v4.35.0
v4.35.1
v4.35.2
v4.36.0
v4.36.1
v4.36.2
v4.37.0
v4.38.0
v4.39.0
v4.4.0
v4.4.1
v4.40.0
v4.41.0
v4.42.0
v4.43.0
v4.44.0
v4.45.0
v4.5.0
v4.5.1
v4.5.2
v4.5.3
v4.5.4
v4.6.0
v4.6.1
v4.6.2
v4.7.0
v4.7.1
v4.7.2
v4.7.4
v4.7.5
v4.8.0
v4.8.1
v4.8.2
v4.8.3
v4.9.0