Описание
Countly, a product analytics solution, is vulnerable to cross-site scripting prior to version 21.11 of the community edition. The victim must follow a malicious link or be redirected there from malicious web site. The attacker must have an account or be able to create one. This issue is patched in version 21.11.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Release Notes
- ExploitThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Release Notes
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 21.11 (исключая)
cpe:2.3:a:count:countly_server:*:*:*:*:community:*:*:*
EPSS
Процентиль: 39%
0.00173
Низкий
5.4 Medium
CVSS3
9 Critical
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 9
github
почти 3 года назад
Countly, a product analytics solution, is vulnerable to cross-site scripting prior to version 21.11 of the community edition. The victim must follow a malicious link or be redirected there from malicious web site. The attacker must have an account or be able to create one. This issue is patched in version 21.11.
EPSS
Процентиль: 39%
0.00173
Низкий
5.4 Medium
CVSS3
9 Critical
CVSS3
Дефекты
CWE-79
CWE-79