Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8823

Опубликовано: 08 фев. 2020
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.

A cross-site scripting (XSS) vulnerability was found in the Node.js library, sockjs. An attacker could use this vulnerability to supply a query string with script tags, which could trick a victim into executing a specially crafted JavaScript code.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Distributed Tracing Jaeger 1jaegerNot affected
OpenShift Service Mesh 1jaegerNot affected
OpenShift Service Mesh 1kialiNot affected
OpenShift Service Mesh 1servicemesh-grafanaNot affected
Red Hat OpenShift Application Runtimesvertx-sockjs-service-proxyNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1813969sockJS: function htmlfile is not checking the non-alphanumeric symbols which could result in reflected XSS

EPSS

Процентиль: 73%
0.00757
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
почти 6 лет назад

htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.

CVSS3: 6.1
github
почти 5 лет назад

Cross-site scripting in SocksJS-node

EPSS

Процентиль: 73%
0.00757
Низкий

6.1 Medium

CVSS3