logo

Database

Description

The application allows the creation of dynamic DOM (Document Object Model) elements from user controlled inputs. In addition to being functionally expensive, this operation can lead to the creation and exploitation of other vulnerabilities such as buffer overflow or memory corruption.

Impact

Cause unexpected behaviors in the application which can lead to system unavailability.

Recommendation

Avoid generating dynamic DOM from user controlled inputs

Threat

Authenticated attacker from the Internet

Expected Remediation Time

⏱️ 120 minutes.

Fixes

Score

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

Attack vector

N

Attack complexity

L

Attack requirements

N

Privileges required

L

User interaction

N

Confidentiality (VC)

N

Integrity (VI)

L

Availability (VA)

N

Confidentiality (SC)

N

Integrity (SI)

N

Availability (SA)

N

Threat 4.0

Exploit maturity

P

Vector string

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P