GHSA-8pf2-qj4v-fj64

Suggest an improvement
Source
https://github.com/advisories/GHSA-8pf2-qj4v-fj64
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-8pf2-qj4v-fj64/GHSA-8pf2-qj4v-fj64.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8pf2-qj4v-fj64
Aliases
Published
2024-02-22T12:30:56Z
Modified
2024-12-11T21:10:20Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Apache Answer Cross-site Scripting vulnerability
Details

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer. This issue affects Apache Answer through 1.2.1.

XSS attack when user enters summary. A logged-in user, when modifying their own submitted question, can input malicious code in the summary to create such an attack.

Users are recommended to upgrade to version 1.2.5, which fixes the issue.

Database specific
{
    "nvd_published_at": "2024-02-22T10:15:08Z",
    "severity": "MODERATE",
    "github_reviewed_at": "2024-02-22T19:30:45Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Go / github.com/apache/incubator-answer

Package

Name
github.com/apache/incubator-answer
View open source insights on deps.dev
Purl
pkg:golang/github.com/apache/incubator-answer

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.5