CVE-2023-40024
CVSS V2 None
CVSS V3 None
Description
ScanCode.io is a server to script and automate software composition analysis pipelines. In the `/license/` endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist. Attackers can exploit this vulnerability to inject malicious scripts into the response generated by the `license_details_view` function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information. This issue has been addressed in release `32.5.2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Overview
- CVE ID
- CVE-2023-40024
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-08-14T20:15:12
- Last Modified Date
- 2023-08-21T18:15:25
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:nexb:scancode.io:*:*:*:*:*:*:*:* | 1 | OR | 32.5.1 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/nexB/scancode.io/blob/dd7769fbc97c84545579cebf1dc4838214098a11/CHANGELOG.rst#v3252-2023-08-14 | Release Notes |
https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj | Exploit Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-40024 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40024 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-09-06 03:43:41 | Added to TrackCVE | |||
2023-09-06 03:43:44 | Weakness Enumeration | new |