Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.
References
Link | Resource |
---|---|
https://github.com/theart42/cves/blob/master/CVE-2021-28079/CVE-2021-28079.md | Exploit Third Party Advisory |
https://www.jamovi.org | Vendor Advisory |
https://github.com/theart42/cves/blob/master/CVE-2021-28079/CVE-2021-28079.md | Exploit Third Party Advisory |
https://www.jamovi.org | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-04-26 12:15
Updated : 2024-11-21 05:59
NVD link : CVE-2021-28079
Mitre link : CVE-2021-28079
CVE.ORG link : CVE-2021-28079
JSON object : View
Products Affected
jamovi
- jamovi
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')