UBUNTU-CVE-2021-21319

Source
https://ubuntu.com/security/CVE-2021-21319
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-21319.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-21319
Upstream
Published
2021-10-25T16:15:00Z
Modified
2025-10-24T04:50:06Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5.

References

Affected packages

Ubuntu:16.04:LTS / galette

Package

Name
galette
Purl
pkg:deb/ubuntu/galette@0.8+dfsg-1ubuntu1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8+dfsg-1
0.8+dfsg-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "galette",
            "binary_version": "0.8+dfsg-1ubuntu1"
        }
    ]
}