Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5.
References
Link | Resource |
---|---|
https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q | Third Party Advisory |
https://bugs.galette.eu/issues/1535 | Permissions Required Vendor Advisory |
https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6 | Patch Third Party Advisory |
https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5 | Patch Third Party Advisory |
https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995 | Patch Third Party Advisory |
Configurations
Information
Published : 2021-10-25 09:15
Updated : 2021-10-27 18:12
NVD link : CVE-2021-21319
Mitre link : CVE-2021-21319
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
galette
- galette