A vulnerability classified as problematic was found in nuxsmin sysPass up to 3.2.4. Affected by this vulnerability is an unknown functionality of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.5 is able to address this issue. The name of the patch is 4da4d031732ecca67519851fd0c34597dbb8ee55. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222319.
References
Link | Resource |
---|---|
https://github.com/nuxsmin/sysPass/releases/tag/3.2.5 | Release Notes |
https://github.com/nuxsmin/sysPass/commit/4da4d031732ecca67519851fd0c34597dbb8ee55 | Patch |
https://vuldb.com/?ctiid.222319 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.222319 | Third Party Advisory |
https://github.com/nuxsmin/sysPass/pull/1832 | Patch |
Configurations
Information
Published : 2023-03-06 08:15
Updated : 2023-03-13 11:33
NVD link : CVE-2022-4930
Mitre link : CVE-2022-4930
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
syspass
- syspass