Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xr7p-8q82-878q

Опубликовано: 06 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 3.1

Описание

teler dashboard vulnerable to DOM-based cross-site scripting (XSS)

Description

teler prior to version <= 2.0.0-rc.4 is vulnerable to DOM-based cross-site scripting (XSS) in the teler dashboard. When teler requests messages from the event stream on the /events endpoint, the log data displayed on the dashboard are not sanitized.

Impact

This only affects authenticated users and can only be exploited based on detected threats if the log contains a DOM scripting payload. This indicates a low severity and there is no significant impact on the users.

Affected Version

This issue was introduced from version v2.0.0-rc to v2.0.0-rc.3 & v2.0.0-dev.

Patches

This vulnerability has been fixed on version v2.0.0-rc.4 & v2.0.0-dev.2.

Workarounds

Here are some workarounds to handle this case:

  • Deactivate the live event dashboard from the configuration file, or
  • Upgrade teler version to v2.0.0-rc.4 or v2.0.0-dev.2 & above.

References

Пакеты

Наименование

teler.app

go
Затронутые версииВерсия исправления

>= 2.0.0-rc, <= 2.0.0-rc.3

2.0.0-rc.4

Наименование

teler.app

go
Затронутые версииВерсия исправления

= 2.0.0-dev

2.0.0-dev.2

Наименование

teler.app

go
Затронутые версииВерсия исправления

>= 0.0.0-20220625162531-2289e90590a9, < 0.0.0-20221203202318-20f59eda2420

0.0.0-20221203202318-20f59eda2420

Наименование

teler.app

go
Затронутые версииВерсия исправления

>= 1.2.3-0.20220625162531-2289e90590a9, < 1.2.3-0.20221203202318-20f59eda2420

1.2.3-0.20221203202318-20f59eda2420

EPSS

Процентиль: 44%
0.00212
Низкий

3.1 Low

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 5.4
nvd
около 3 лет назад

teler is an real-time intrusion detection and threat alert dashboard. teler prior to version 2.0.0-rc.4 is vulnerable to DOM-based cross-site scripting (XSS) in the teler dashboard. When teler requests messages from the event stream on the `/events` endpoint, the log data displayed on the dashboard are not sanitized. This only affects authenticated users and can only be exploited based on detected threats if the log contains a DOM scripting payload. This vulnerability has been fixed on version `v2.0.0-rc.4`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 44%
0.00212
Низкий

3.1 Low

CVSS3

Дефекты

CWE-79