Englesystem is a shift planning system for chaos events. Engelsystem prior to v3.4.1 performed insufficient validation of user supplied data for the DECT number, mobile number, and work-log comment fields. The values of those fields would be displayed in corresponding log overviews, allowing the injection and execution of Javascript code in another user's context. This vulnerability enables an authenticated user to inject Javascript into other user's sessions. The injected JS will be executed during normal usage of the system when viewing, e.g., overview pages. This issue has been fixed in version 3.4.1.
References
Link | Resource |
---|---|
https://github.com/engelsystem/engelsystem/commit/efda1ffc1ce59f02a7d237d9087adea26e73ec5f | Patch |
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-p5ch-rrpm-wvhm | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-12-22T20:37:47.224Z
Updated: 2023-12-22T20:37:47.224Z
Reserved: 2023-12-15T20:57:23.174Z
Link: CVE-2023-50924
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-12-22T21:15:08.370
Modified: 2024-01-05T12:09:54.470
Link: CVE-2023-50924
JSON object: View
Redhat Information
No data.
CWE