Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-26rc-mj52-pcf5

Опубликовано: 28 авг. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 5.3
CVSS3: 6.5

Описание

HyperView Geoportal Toolkit in versions though 8.2.4 does not restrict cross-domain requests when fetching remote content pointed by one of GET request parameters. An unauthenticated remote attacker can prepare links, which upon opening will load scripts from a remote location controlled by the attacker and execute them in the user space. By manipulating this parameter it is also possible to enumerate some of the devices in Local Area Network in which the server resides.

HyperView Geoportal Toolkit in versions though 8.2.4 does not restrict cross-domain requests when fetching remote content pointed by one of GET request parameters. An unauthenticated remote attacker can prepare links, which upon opening will load scripts from a remote location controlled by the attacker and execute them in the user space. By manipulating this parameter it is also possible to enumerate some of the devices in Local Area Network in which the server resides.

EPSS

Процентиль: 39%
0.00172
Низкий

5.3 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-942

Связанные уязвимости

CVSS3: 6.5
nvd
больше 1 года назад

HyperView Geoportal Toolkit in versions lower than 8.5.0 does not restrict cross-domain requests when fetching remote content pointed by one of GET request parameters. An unauthenticated remote attacker can prepare links, which upon opening will load scripts from a remote location controlled by the attacker and execute them in the user space. By manipulating this parameter it is also possible to enumerate some of the devices in Local Area Network in which the server resides.

EPSS

Процентиль: 39%
0.00172
Низкий

5.3 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-942