CVE-2018-1000665 – org.dojotoolkit:dojo
Package
Manager: maven
Name: org.dojotoolkit:dojo
Vulnerable Version: >=0 <1.14
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00237 pctl0.46738
Details
Improper Neutralization of Input During Web Page Generation in Dojo Dojo Objective Harness Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in `unit.html` and `testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html` and `testsDOH/_base/i18nExhaustive.js` in the DOH that can result in Victim attacked through their browser - deliver malware, steal HTTP cookies, bypass CORS trust. This attack appear to be exploitable via Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. This vulnerability appears to have been fixed in 1.14.
Metadata
Created: 2022-05-14T02:01:21Z
Modified: 2023-09-08T21:17:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vmq9-cm7m-4p8p/GHSA-vmq9-cm7m-4p8p.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-vmq9-cm7m-4p8p
Finding: F008
Auto approve: 1