Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x3gq-h244-25jf

Опубликовано: 14 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.4
CVSS3: 6.1

Описание

There is a reflected cross-site scripting (XSS) within JSP files used to control application appearance. An unauthenticated attacker could deceive a user into clicking a crafted link to trigger the vulnerability. Stealing the session cookie is not possible due to cookie security flags, however the XSS may be used to induce a victim to perform on-site requests without their knowledge.

This vulnerability only affects LogicalDOC Enterprise.

There is a reflected cross-site scripting (XSS) within JSP files used to control application appearance. An unauthenticated attacker could deceive a user into clicking a crafted link to trigger the vulnerability. Stealing the session cookie is not possible due to cookie security flags, however the XSS may be used to induce a victim to perform on-site requests without their knowledge.

This vulnerability only affects LogicalDOC Enterprise.

EPSS

Процентиль: 53%
0.00303
Низкий

6.4 Medium

CVSS4

6.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
11 месяцев назад

There is a reflected cross-site scripting (XSS) within JSP files used to control application appearance. An unauthenticated attacker could deceive a user into clicking a crafted link to trigger the vulnerability. Stealing the session cookie is not possible due to cookie security flags, however the XSS may be used to induce a victim to perform on-site requests without their knowledge. This vulnerability only affects LogicalDOC Enterprise.

EPSS

Процентиль: 53%
0.00303
Низкий

6.4 Medium

CVSS4

6.1 Medium

CVSS3

Дефекты

CWE-79