logo

CVE-2024-3138 francoisjacquet/rosariosis

Package

Manager: composer
Name: francoisjacquet/rosariosis
Vulnerable Version: >=0 <=11.5.1

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00165 pctl0.38002

Details

RosarioSIS cross site scripting vulnerability ** DISPUTED ** A vulnerability was found in francoisjacquet RosarioSIS 11.5.1. It has been rated as problematic. This issue affects some unknown processing of the component Add Portal Note. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-258911. NOTE: The vendor explains that the PDF is opened by the browser app in a sandbox, so no data from the website should be accessible.

Metadata

Created: 2024-04-02T00:30:46Z
Modified: 2024-04-02T18:21:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-r32g-w9cv-9fgc/GHSA-r32g-w9cv-9fgc.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-r32g-w9cv-9fgc
Finding: F008
Auto approve: 1