File tree Expand file tree Collapse file tree 3 files changed +29
-3
lines changed Expand file tree Collapse file tree 3 files changed +29
-3
lines changed Original file line number Diff line number Diff line change @@ -10,6 +10,7 @@ description: |
10
10
A cross-site scripting vulnerability flaw was found in
11
11
the auto_link function in Rails before version 3.0.6.
12
12
cvss_v2 : 4.3
13
+ cvss_v3 : 6.1
13
14
patched_versions :
14
15
- " >= 3.0.6"
15
16
related :
Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : camaleon_cms
3
+ cve : 2023-30145
4
+ ghsa : x487-866m-p8hr
5
+ url : http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html
6
+ title : Server-Side Template Injection in Camaleon CMS
7
+ date : 2023-05-26
8
+ description : |
9
+ Camaleon CMS prior to 2.7.4 was discovered to contain a Server-Side
10
+ Template Injection (SSTI) vulnerability via the `formats` parameter.
11
+ cvss_v3 : 9.8
12
+ patched_versions :
13
+ - " >= 2.7.4"
14
+ related :
15
+ url :
16
+ - https://nvd.nist.gov/vuln/detail/CVE-2023-30145
17
+ - https://github.com/paragbagul111/CVE-2023-30145
18
+ - http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html
19
+ - https://github.com/owen2345/camaleon-cms/issues/1052
20
+ - https://github.com/owen2345/camaleon-cms/commit/4485788c544eb1aae52ca613bd9626129e3df6ee
21
+ - https://github.com/owen2345/camaleon-cms/releases/tag/2.7.4
22
+ - https://drive.google.com/file/d/11MsSYqUnDRFjcwbQKJeL9Q8nWpgVYf2r/view?usp=share_link
23
+ - https://portswigger.net/research/server-side-template-injection
24
+ - https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection
25
+ - https://github.com/advisories/GHSA-x487-866m-p8hr
Original file line number Diff line number Diff line change 2
2
gem : jquery-rails
3
3
framework : rails
4
4
cve : 2019-11358
5
- date : 2019-04-19
5
+ ghsa : 6c3j-c64m-qhgq
6
6
url : https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
7
7
title : Prototype pollution attack through jQuery $.extend
8
+ date : 2019-04-19
8
9
description : |
9
10
jQuery before 3.4.0 mishandles jQuery.extend(true, {}, ...) because of
10
11
bject.prototype pollution. If an unsanitized source object contained an
11
12
enumerable __proto__ property, it could extend the native Object.prototype.
12
13
cvss_v2 : 4.3
13
14
cvss_v3 : 6.1
14
15
patched_versions :
15
- - ' >= 4.3.4'
16
-
16
+ - " >= 4.3.4"
17
17
related :
18
18
url :
19
19
- https://hackerone.com/reports/454365
You can’t perform that action at this time.
0 commit comments