Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8031

Опубликовано: 11 фев. 2021
Источник: debian
EPSS Низкий

Описание

A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Open Build Service allows remote attackers to store JS code in markdown that is not properly escaped, impacting confidentiality and integrity. This issue affects: Open Build Service versions prior to 2.10.8.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
open-build-servicefixed2.9.4-4package
open-build-servicepostponedstretchpackage

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=1178880

  • With 2.9.4-4, the rails web frontend is no longer shipped, marking as fixed version

EPSS

Процентиль: 44%
0.00217
Низкий

Связанные уязвимости

CVSS3: 6.3
ubuntu
почти 5 лет назад

A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Open Build Service allows remote attackers to store JS code in markdown that is not properly escaped, impacting confidentiality and integrity. This issue affects: Open Build Service versions prior to 2.10.8.

CVSS3: 6.3
nvd
почти 5 лет назад

A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Open Build Service allows remote attackers to store JS code in markdown that is not properly escaped, impacting confidentiality and integrity. This issue affects: Open Build Service versions prior to 2.10.8.

github
больше 3 лет назад

A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Open Build Service allows remote attackers to store JS code in markdown that is not properly escaped, impacting confidentiality and integrity. This issue affects: Open Build Service versions prior to 2.10.8.

EPSS

Процентиль: 44%
0.00217
Низкий