CVE-2024-33670 – passbolt/passbolt_api
Package
Manager: composer
Name: passbolt/passbolt_api
Vulnerable Version: >=0 <4.6.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00338 pctl0.55959
Details
Passbolt API allows HTML injection Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom content being displayed when a user visits the crafted URL. Although the injected content is not executed as JavaScript due to Content Security Policy (CSP) restrictions, it may still impact the appearance and user interaction of the page.
Metadata
Created: 2024-04-26T03:30:29Z
Modified: 2024-04-26T16:42:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-2pg6-vw9c-qhjv/GHSA-2pg6-vw9c-qhjv.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-2pg6-vw9c-qhjv
Finding: F008
Auto approve: 1