Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2014/q2/494 | Third Party Advisory VDB Entry |
http://seclists.org/oss-sec/2014/q2/498 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/58691 | Permissions Required Third Party Advisory |
http://www.securityfocus.com/bid/67932 | Third Party Advisory VDB Entry |
https://code.google.com/p/reviewboard/issues/detail?id=3406 | Not Applicable |
https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd | Patch Issue Tracking |
https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e | Exploit Patch Issue Tracking |
https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf | Patch Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2014-06-16T18:00:00
Updated: 2015-04-21T12:57:01
Reserved: 2014-06-06T00:00:00
Link: CVE-2014-3994
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-06-16T18:55:09.433
Modified: 2016-08-23T14:49:05.787
Link: CVE-2014-3994
JSON object: View
Redhat Information
No data.
CWE