GHSA-GMG5-R3C4-3FM9
Vulnerability from github – Published: 2022-05-24 16:47 – Updated: 2024-02-23 18:00
VLAI?
Summary
Withdrawn Advisory: Fat Free CRM Cross-site Scripting vulnerability
Details
Withdrawn
This advisory has been withdrawn because the CVE has been disputed and the underlying vulnerability is likely invalid. This link is maintained to preserve external references.
According to maintainers of Fat Free CRM, the CRM comment feature allows certain HTML markup, but santizes the output when rendered to page. This allows safe tags (such as <h1> which the author tested and reported as a vulnerability) but correctly disallows <script> tags and other dangerous entities.
Original Description
HTML Injection has been discovered in the v0.19.0 version of the Fat Free CRM product via an authenticated request to the /comments URI.
Severity ?
5.4 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "fat_free_crm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.19.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2019-10226"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2023-01-23T14:12:23Z",
"nvd_published_at": "2019-06-10T23:29:00Z",
"severity": "MODERATE"
},
"details": "## Withdrawn\nThis advisory has been withdrawn because the CVE has been disputed and the underlying vulnerability is likely invalid. This link is maintained to preserve external references.\n\n[According to maintainers of Fat Free CRM](https://github.com/github/advisory-database/pull/3599), the CRM comment feature allows certain HTML markup, but santizes the output when rendered to page. This allows safe tags (such as `\u003ch1\u003e` which the author tested and reported as a vulnerability) but correctly disallows `\u003cscript\u003e` tags and other dangerous entities.\n\n## Original Description\nHTML Injection has been discovered in the v0.19.0 version of the Fat Free CRM product via an authenticated request to the /comments URI.",
"id": "GHSA-gmg5-r3c4-3fm9",
"modified": "2024-02-23T18:00:56Z",
"published": "2022-05-24T16:47:42Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10226"
},
{
"type": "WEB",
"url": "https://github.com/fatfreecrm/fat_free_crm/issues/1235"
},
{
"type": "WEB",
"url": "https://github.com/github/advisory-database/pull/3599"
},
{
"type": "WEB",
"url": "https://apidock.com/rails/ActionView/Helpers/TextHelper/simple_format"
},
{
"type": "PACKAGE",
"url": "https://github.com/fatfreecrm/fat_free_crm"
},
{
"type": "WEB",
"url": "https://github.com/fatfreecrm/fat_free_crm/blob/master/app/views/comments/_comment.html.haml#L2"
},
{
"type": "WEB",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fat_free_crm/CVE-2019-10226.yml"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/46617"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Withdrawn Advisory: Fat Free CRM Cross-site Scripting vulnerability",
"withdrawn": "2024-02-23T18:00:56Z"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…