K-Box is a web-based application to manage documents, images, videos and geodata. Prior to version 0.33.1, a stored Cross-Site-Scripting (XSS) vulnerability is present in the markdown editor used by the document abstract and markdown file preview. A specifically crafted anchor link can, if clicked, execute untrusted javascript actions, like retrieving user cookies. Version 0.33.1 includes a patch that allows discarding unsafe links.
References
Link | Resource |
---|---|
https://github.com/k-box/k-box/commit/3bb4df9a4d01aade5bffaa603a514d1a5fabd214 | Patch Third Party Advisory |
https://github.com/k-box/k-box/security/advisories/GHSA-wwcw-h4mf-mvxf | Third Party Advisory |
https://github.com/k-box/k-box/commit/3bb4df9a4d01aade5bffaa603a514d1a5fabd214 | Patch Third Party Advisory |
https://github.com/k-box/k-box/security/advisories/GHSA-wwcw-h4mf-mvxf | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-02-14 21:15
Updated : 2024-11-21 06:48
NVD link : CVE-2022-23637
Mitre link : CVE-2022-23637
CVE.ORG link : CVE-2022-23637
JSON object : View
Products Affected
k-link
- k-box
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')