Search criteria
2 vulnerabilities found for lrs by yetanalytics
CVE-2024-26140 (GCVE-0-2024-26140)
Vulnerability from nvd – Published: 2024-02-20 21:47 – Updated: 2024-08-01 23:59
VLAI?
Title
com.yetanalytics/lrs has Cross-site Scripting Vulnerability in Statement Browser
Summary
com.yetanalytics/lrs is the Yet Analytics Core LRS Library. Prior to version 1.2.17 of the LRS library and version 0.7.5 of SQL LRS, a maliciously crafted xAPI statement could be used to perform script or other tag injection in the LRS Statement Browser. The problem is patched in version 1.2.17 of the LRS library and version 0.7.5 of SQL LRS. No known workarounds exist.
Severity ?
4.6 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| yetanalytics | lrs |
Affected:
< 0.7.5
Affected: < 1.2.17 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-26140",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-21T20:38:15.549793Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:53.235Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T23:59:32.684Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/yetanalytics/lrs/security/advisories/GHSA-7rw2-3hhp-rc46",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/yetanalytics/lrs/security/advisories/GHSA-7rw2-3hhp-rc46"
},
{
"name": "https://github.com/yetanalytics/lrs/commit/d7f4883bc2252337d25e8bba2c7f9d172f5b0621",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yetanalytics/lrs/commit/d7f4883bc2252337d25e8bba2c7f9d172f5b0621"
},
{
"name": "https://clojars.org/com.yetanalytics/lrs/versions/1.2.17",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://clojars.org/com.yetanalytics/lrs/versions/1.2.17"
},
{
"name": "https://github.com/yetanalytics/lrs/releases/tag/v1.2.17",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yetanalytics/lrs/releases/tag/v1.2.17"
},
{
"name": "https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "lrs",
"vendor": "yetanalytics",
"versions": [
{
"status": "affected",
"version": "\u003c 0.7.5"
},
{
"status": "affected",
"version": "\u003c 1.2.17"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "com.yetanalytics/lrs is the Yet Analytics Core LRS Library. Prior to version 1.2.17 of the LRS library and version 0.7.5 of SQL LRS, a maliciously crafted xAPI statement could be used to perform script or other tag injection in the LRS Statement Browser. The problem is patched in version 1.2.17 of the LRS library and version 0.7.5 of SQL LRS. No known workarounds exist."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-20T21:47:08.027Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/yetanalytics/lrs/security/advisories/GHSA-7rw2-3hhp-rc46",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/yetanalytics/lrs/security/advisories/GHSA-7rw2-3hhp-rc46"
},
{
"name": "https://github.com/yetanalytics/lrs/commit/d7f4883bc2252337d25e8bba2c7f9d172f5b0621",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yetanalytics/lrs/commit/d7f4883bc2252337d25e8bba2c7f9d172f5b0621"
},
{
"name": "https://clojars.org/com.yetanalytics/lrs/versions/1.2.17",
"tags": [
"x_refsource_MISC"
],
"url": "https://clojars.org/com.yetanalytics/lrs/versions/1.2.17"
},
{
"name": "https://github.com/yetanalytics/lrs/releases/tag/v1.2.17",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yetanalytics/lrs/releases/tag/v1.2.17"
},
{
"name": "https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5"
}
],
"source": {
"advisory": "GHSA-7rw2-3hhp-rc46",
"discovery": "UNKNOWN"
},
"title": "com.yetanalytics/lrs has Cross-site Scripting Vulnerability in Statement Browser"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-26140",
"datePublished": "2024-02-20T21:47:08.027Z",
"dateReserved": "2024-02-14T17:40:03.688Z",
"dateUpdated": "2024-08-01T23:59:32.684Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-26140 (GCVE-0-2024-26140)
Vulnerability from cvelistv5 – Published: 2024-02-20 21:47 – Updated: 2024-08-01 23:59
VLAI?
Title
com.yetanalytics/lrs has Cross-site Scripting Vulnerability in Statement Browser
Summary
com.yetanalytics/lrs is the Yet Analytics Core LRS Library. Prior to version 1.2.17 of the LRS library and version 0.7.5 of SQL LRS, a maliciously crafted xAPI statement could be used to perform script or other tag injection in the LRS Statement Browser. The problem is patched in version 1.2.17 of the LRS library and version 0.7.5 of SQL LRS. No known workarounds exist.
Severity ?
4.6 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| yetanalytics | lrs |
Affected:
< 0.7.5
Affected: < 1.2.17 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-26140",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-21T20:38:15.549793Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:53.235Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T23:59:32.684Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/yetanalytics/lrs/security/advisories/GHSA-7rw2-3hhp-rc46",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/yetanalytics/lrs/security/advisories/GHSA-7rw2-3hhp-rc46"
},
{
"name": "https://github.com/yetanalytics/lrs/commit/d7f4883bc2252337d25e8bba2c7f9d172f5b0621",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yetanalytics/lrs/commit/d7f4883bc2252337d25e8bba2c7f9d172f5b0621"
},
{
"name": "https://clojars.org/com.yetanalytics/lrs/versions/1.2.17",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://clojars.org/com.yetanalytics/lrs/versions/1.2.17"
},
{
"name": "https://github.com/yetanalytics/lrs/releases/tag/v1.2.17",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yetanalytics/lrs/releases/tag/v1.2.17"
},
{
"name": "https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "lrs",
"vendor": "yetanalytics",
"versions": [
{
"status": "affected",
"version": "\u003c 0.7.5"
},
{
"status": "affected",
"version": "\u003c 1.2.17"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "com.yetanalytics/lrs is the Yet Analytics Core LRS Library. Prior to version 1.2.17 of the LRS library and version 0.7.5 of SQL LRS, a maliciously crafted xAPI statement could be used to perform script or other tag injection in the LRS Statement Browser. The problem is patched in version 1.2.17 of the LRS library and version 0.7.5 of SQL LRS. No known workarounds exist."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-20T21:47:08.027Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/yetanalytics/lrs/security/advisories/GHSA-7rw2-3hhp-rc46",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/yetanalytics/lrs/security/advisories/GHSA-7rw2-3hhp-rc46"
},
{
"name": "https://github.com/yetanalytics/lrs/commit/d7f4883bc2252337d25e8bba2c7f9d172f5b0621",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yetanalytics/lrs/commit/d7f4883bc2252337d25e8bba2c7f9d172f5b0621"
},
{
"name": "https://clojars.org/com.yetanalytics/lrs/versions/1.2.17",
"tags": [
"x_refsource_MISC"
],
"url": "https://clojars.org/com.yetanalytics/lrs/versions/1.2.17"
},
{
"name": "https://github.com/yetanalytics/lrs/releases/tag/v1.2.17",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yetanalytics/lrs/releases/tag/v1.2.17"
},
{
"name": "https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5"
}
],
"source": {
"advisory": "GHSA-7rw2-3hhp-rc46",
"discovery": "UNKNOWN"
},
"title": "com.yetanalytics/lrs has Cross-site Scripting Vulnerability in Statement Browser"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-26140",
"datePublished": "2024-02-20T21:47:08.027Z",
"dateReserved": "2024-02-14T17:40:03.688Z",
"dateUpdated": "2024-08-01T23:59:32.684Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}