GHSA-7qcx-jmrc-h2rr

Suggest an improvement
Source
https://github.com/advisories/GHSA-7qcx-jmrc-h2rr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/11/GHSA-7qcx-jmrc-h2rr/GHSA-7qcx-jmrc-h2rr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7qcx-jmrc-h2rr
Aliases
Published
2017-11-15T19:44:16Z
Modified
2023-11-08T03:58:58.853594Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Cross-Site Scripting in keystone
Details

Versions of keystone prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the Contact Us page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser.

Recommendation

Update to version 4.0.0 or later.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:23:19Z"
}
References

Affected packages

npm / keystone

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.0