CVE-2024-43412

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-43412
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43412.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-43412
Aliases
  • GHSA-336f-wrgx-57gg
Published
2024-09-03T17:15:14Z
Modified
2024-09-04T01:57:06.109138Z
Summary
[none]
Details

Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute arbitrary JavaScript via the file preview function. Users can upload HTML/CSS/JS files into the Xibo Library via the Generic File module to be referenced on Displays and in Layouts. This is intended functionality. When previewing these resources from the Library and Layout editor they are executed in the users browser. This will be disabled in future releases, and users are encouraged to use the new developer tools in 4.1 to design their widgets which require this type of functionality. This behavior has been changed in 4.1.0 to preview previewing of generic files. There are no workarounds for this issue.

References

Affected packages

Git / github.com/xibosignage/xibo-cms

Affected ranges

Type
GIT
Repo
https://github.com/xibosignage/xibo-cms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.6.0-rc1
1.7.0
1.7.0-alpha
1.7.0-alpha2
1.7.1
1.7.2
1.7.3
1.7.4
1.8.0
1.8.0-alpha
1.8.0-alpha2
1.8.0-alpha3
1.8.0-beta
1.8.0-rc1
1.8.0-rc2
1.8.0-rc3
1.8.1
1.8.10
1.8.11
1.8.12
1.8.2
1.8.3
1.8.4
1.8.5
1.8.6
1.8.7
1.8.8
1.8.9

2.*

2.0.0
2.0.0-alpha1
2.0.0-beta
2.0.0-beta.2
2.0.0-rc1
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.1.0
2.1.0-alpha1
2.1.0-alpha2
2.1.0-beta
2.1.0-rc1
2.1.1
2.1.2
2.2.0
2.2.0-alpha
2.2.0-alpha2
2.2.0-beta
2.2.0-rc1
2.2.1
2.2.2
2.2.3
2.3.0
2.3.0-alpha
2.3.0-beta
2.3.0-rc1
2.3.1
2.3.10
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.3.9

3.*

3.0.0
3.0.0-alpha
3.0.0-alpha2
3.0.0-alpha3
3.0.0-beta
3.0.0-rc1
3.0.0-rc2
3.0.0-rc3
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.0.7
3.0.8
3.1.0
3.1.0-alpha
3.1.0-beta
3.1.1

4.*

4.0.0
4.0.0-alpha
4.0.0-alpha2
4.0.0-beta
4.0.0-rc1
4.0.0-rc2
4.1.0-alpha
4.1.0-alpha2
4.1.0-beta
4.1.0-rc2