raptor-web is a CMS for game server communities that can be used to host information and keep track of players. In version 0.4.4 of raptor-web, it is possible to craft a malicious URL that will result in a reflected cross-site scripting vulnerability. A user controlled URL parameter is loaded into an internal template that has autoescape disabled. This is a cross-site scripting vulnerability that affects all deployments of `raptor-web` on version `0.4.4`. Any victim who clicks on a malicious crafted link will be affected. This issue has been patched 0.4.4.1.
References
Link | Resource |
---|---|
https://github.com/zediious/raptor-web/releases/tag/0.4.4.1 | Patch |
https://github.com/zediious/raptor-web/security/advisories/GHSA-8r6g-fhh4-xhmq | Exploit Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-11-28T18:15:24.447Z
Updated: 2023-11-28T18:15:24.447Z
Reserved: 2023-11-21T18:57:30.427Z
Link: CVE-2023-49078
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-28T19:15:07.397
Modified: 2023-12-04T17:41:18.540
Link: CVE-2023-49078
JSON object: View
Redhat Information
No data.
CWE