An issue was discovered in the Gantt-Chart module before 5.5.5 for Jira. Due to missing validation of user input, it is vulnerable to a persistent XSS attack. An attacker can embed the attack vectors in the dashboard of other users. To exploit this vulnerability, an attacker has to be authenticated.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/158752/Gantt-Chart-For-Jira-5.5.4-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-030.txt | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Aug/1 | Exploit Mailing List Third Party Advisory |
https://marketplace.atlassian.com/apps/28997/gantt-chart-for-jira?hosting=cloud&tab=overview | Product Third Party Advisory |
Configurations
Information
Published : 2020-08-04 13:15
Updated : 2020-08-06 06:31
NVD link : CVE-2020-15944
Mitre link : CVE-2020-15944
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
gantt-chart_project
- gantt-chart