Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.
                
            References
                    | Link | Resource | 
|---|---|
| http://seclists.org/oss-sec/2014/q2/498 | Third Party Advisory VDB Entry | 
| https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd | Patch Issue Tracking | 
| https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e | Exploit Patch Issue Tracking | 
| http://seclists.org/oss-sec/2014/q2/494 | Third Party Advisory VDB Entry | 
| http://secunia.com/advisories/58691 | Permissions Required Third Party Advisory | 
| https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf | Patch Issue Tracking | 
| https://code.google.com/p/reviewboard/issues/detail?id=3406 | Not Applicable | 
| http://www.securityfocus.com/bid/67932 | Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2014-06-16 11:55
Updated : 2016-08-23 07:49
NVD link : CVE-2014-3994
Mitre link : CVE-2014-3994
JSON object : View
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
                reviewboard
- djblets
 - reviewboard
 


