alf.io is an open source ticket reservation system for conferences, trade shows, workshops, and meetups. Prior to version 2.0-M5, the preloaded data as json is not escaped correctly, the administrator / event admin could break their own install by inserting non correctly escaped text. The Content-Security-Policy directive blocks any potential script execution. The administrator or event administrator can override the texts for customization purpose. The texts are not properly escaped. Version 2.0-M5 fixes this issue.
References
Link | Resource |
---|---|
https://github.com/alfio-event/alf.io/commit/e7131c588f4ac31067a41d0e31e6a6a721b2ff4b | Patch |
https://github.com/alfio-event/alf.io/security/advisories/GHSA-mcx6-25f8-8rqw | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-09-06 13:15
Updated : 2024-09-30 12:48
NVD link : CVE-2024-45299
Mitre link : CVE-2024-45299
CVE.ORG link : CVE-2024-45299
JSON object : View
Products Affected
alf
- alf
CWE
CWE-116
Improper Encoding or Escaping of Output