Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2014/q2/498 | Third Party Advisory VDB Entry |
https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd | Patch Issue Tracking |
https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e | Exploit Patch Issue Tracking |
http://seclists.org/oss-sec/2014/q2/494 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/58691 | Permissions Required Third Party Advisory |
https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf | Patch Issue Tracking |
https://code.google.com/p/reviewboard/issues/detail?id=3406 | Not Applicable |
http://www.securityfocus.com/bid/67932 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-06-16 11:55
Updated : 2016-08-23 07:49
NVD link : CVE-2014-3994
Mitre link : CVE-2014-3994
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
reviewboard
- djblets
- reviewboard