` element. By creating a crafted wiki page, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the page is viewed by other users. For an example see referenced GitHub Security Advisory. Commit 5ffa189383dd716f12b56b8cae2ba0d075996cf1 fixes this vulnerability by adding the v-pre directive to all `` tags during the render.
Metrics
CVSS Version: 3.1 | Base Score: 7.6 HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N
l➤ Exploitability Metrics:
Attack Vector (AV)* NETWORK
Attack Complexity (AC)* LOW
Privileges Required (PR)* LOW
User Interaction (UI)* REQUIRED
Scope (S)* CHANGED
l➤ Impact Metrics:
Confidentiality Impact (C)* LOW
Integrity Impact (I)* HIGH
Availability Impact (A)* NONE
Weakness Enumeration (CWE)
CWE-ID: CWE-79
CWE Name: CWE-79: Improper Neutralization of Input During Web Page Generation ( Cross-site Scripting )
Source: Requarks
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID:
CAPEC Description:
Source: NVD (National Vulnerability Database).
▸ CVE-2024-9999 ◂ Discovered: 12/11/2024 Status: PUBLISHED |
▸ CVE-2024-9997 ◂ Discovered: 29/10/2024 Status: PUBLISHED |
▸ CVE-2024-9996 ◂ Discovered: 29/10/2024 Status: PUBLISHED |
Tags:
CVE-2021-21383 Vulnerability Details